Sciweavers

180 search results - page 36 / 36
» An initial investigation into non-visual computer supported ...
Sort
View
JCDL
2004
ACM
106views Education» more  JCDL 2004»
13 years 10 months ago
Sharing encountered information: digital libraries get a social life
As part of a more extensive study of reading-related practices, we have explored how people share information they encounter in their everyday reading as a complement to the more ...
Catherine C. Marshall, Sara A. Bly
OZCHI
2009
ACM
13 years 11 months ago
Doing things backwards: the OWL project
The OWL project is inspired by Arthur C. Clarke's Third Law of Technology Prediction: Any sufficiently advanced technology is indistinguishable from magic. It consists of a s...
Danielle Wilde, Kristina Andersen
SPAA
2010
ACM
13 years 4 months ago
On the bit communication complexity of randomized rumor spreading
We study the communication complexity of rumor spreading in the random phone-call model. Suppose n players communicate in parallel rounds, where in each round every player calls a...
Pierre Fraigniaud, George Giakkoupis
EUROCRYPT
2003
Springer
13 years 9 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
SIGSOFT
2005
ACM
14 years 5 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...