Sciweavers

108 search results - page 15 / 22
» Why Is this User Asking so Many Questions
Sort
View
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
ErmineJ: Tool for functional analysis of gene expression data sets
Background: It is common for the results of a microarray study to be analyzed in the context of biologically-motivated groups of genes such as pathways or Gene Ontology categories...
Homin K. Lee, William Braynen, Kiran Keshav, Paul ...
WWW
2005
ACM
14 years 8 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
CHI
1998
ACM
13 years 12 months ago
The Progress Portfolio: Designing Reflective Tools for a Classroom Context
A great deal of effort has gone into developing open-ended inquiry activities for science education as well as complex computer tools for accessing scientific data to help student...
Ben Loh, Josh Radinsky, Eric Russell, Louis M. Gom...
COMPGEOM
2001
ACM
13 years 11 months ago
Computational geometry for sculpture
This presentation illustrates examples of my geometric sculpture and outlines certain design techniques. I apply methods from the field of computational geometry to the creation o...
George W. Hart