Sciweavers

1734 search results - page 155 / 347
» What works
Sort
View
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
12 years 25 days ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
CHI
1994
ACM
14 years 2 months ago
User interface tools
A user interface software tool helps developers design and implement the user interface. Research on past tools has had enormous impact on today's developers--virtually all a...
Brad A. Myers, Dan R. Olsen
COMPSEC
2008
138views more  COMPSEC 2008»
13 years 10 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
PET
2012
Springer
12 years 25 days ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
KDD
2008
ACM
207views Data Mining» more  KDD 2008»
14 years 10 months ago
Active learning with direct query construction
Active learning may hold the key for solving the data scarcity problem in supervised learning, i.e., the lack of labeled data. Indeed, labeling data is a costly process, yet an ac...
Charles X. Ling, Jun Du