Sciweavers

572 search results - page 24 / 115
» What do usability evaluators do in practice
Sort
View
NORDSEC
2009
Springer
14 years 5 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
CCS
2011
ACM
12 years 10 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
ISHPC
2003
Springer
14 years 3 months ago
Evaluating Heuristic Scheduling Algorithms for High Performance Parallel Processing
Most cluster systems used in high performance computing do not allow process relocation at run-time. Finding an allocation that results in minimal completion time is NP-hard and (n...
Lars Lundberg, Magnus Broberg, Kamilla Klonowska
DGO
2007
125views Education» more  DGO 2007»
14 years 2 days ago
Members of congress websites: diffusion at the tip of the iceberg
How do Members of Congress manage the opportunities that the Internet offers? Here we present the initial results from interviews with 100 Congressional offices about their decisi...
David Lazer, Ines Mergel, Curt Ziniel, Kevin Ester...
ESOP
2005
Springer
14 years 4 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers