Sciweavers

728 search results - page 127 / 146
» ideas 2009
Sort
View
TEI
2009
ACM
95views Hardware» more  TEI 2009»
14 years 2 months ago
Living interfaces: the intimate door lock
In this paper we introduce a new way to interact intimately with an automated system. The Intimate Door Lock investigates the psychological effects of intimate humanhuman interact...
Miriam Roy, Fabian Hemmert, Reto Wettach
CCS
2009
ACM
14 years 2 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ICSE
2009
IEEE-ACM
14 years 2 months ago
Toward deeply adaptive societies of digital systems
Modern societies are pervaded by computerized, heterogeneous devices designed for specific purposes, but also more and more often capable of interacting with other devices for en...
Antonio Carzaniga, Giovanni Denaro, Mauro Pezz&egr...
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
14 years 2 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...