Sciweavers

228 search results - page 23 / 46
» Two Normal Forms for Rewriting P Systems
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
14 years 1 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
CSCW
2004
ACM
13 years 11 months ago
Putting systems into place: a qualitative study of design requirements for location-aware community systems
We present a conceptual framework for location-aware community systems and results from two studies of how sociallydefined places influence people's information sharing and c...
Quentin Jones, Sukeshini A. Grandhi, Steve Whittak...
METRICS
2003
IEEE
14 years 20 days ago
Design Patterns and Change Proneness: An Examination of Five Evolving Systems
Design patterns are recognized, named solutions to common design problems. The use of the most commonly referenced design patterns should promote adaptable and reusable program co...
James M. Bieman, Greg Straw, Huxia Wang, P. Willar...
TITB
2008
178views more  TITB 2008»
13 years 7 months ago
Automated Diagnosis of Coronary Artery Disease Based on Data Mining and Fuzzy Modeling
A fuzzy rule-based decision support system (DSS) is presented for the diagnosis of coronary artery disease (CAD). The system is automatically generated from an initial annotated da...
Markos G. Tsipouras, Themis P. Exarchos, Dimitrios...