Sciweavers

1734 search results - page 249 / 347
» What works
Sort
View
HOST
2011
IEEE
12 years 10 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
IACR
2011
94views more  IACR 2011»
12 years 10 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
FASE
2012
Springer
12 years 6 months ago
Cohesive and Isolated Development with Branches
The adoption of distributed version control (DVC), such as Git and Mercurial, in open-source software (OSS) projects has been explosive. Why is this and how are projects using DVC?...
Earl T. Barr, Christian Bird, Peter C. Rigby, Abra...
TVCG
2012
183views Hardware» more  TVCG 2012»
12 years 25 days ago
Empirical Studies in Information Visualization: Seven Scenarios
—We take a new, scenario-based look at evaluation in information visualization. Our seven scenarios, evaluating visual data analysis and reasoning, evaluating user performance, e...
Heidi Lam, Enrico Bertini, Petra Isenberg, Catheri...
TKDE
2012
207views Formal Methods» more  TKDE 2012»
12 years 24 days ago
Mining Web Graphs for Recommendations
—As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommend...
Hao Ma, Irwin King, Michael R. Lyu