Sciweavers

2927 search results - page 1 / 586
» Secure Distributed Human Computation
Sort
View
FC
2005
Springer
83views Cryptology» more  FC 2005»
13 years 10 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...
UIALL
2004
Springer
13 years 10 months ago
A Framework for Context-Sensitive Coordination of Human Interruptions in Human-Computer Interaction
Abstract. Recent trends in software development directed toward intelligence, distribution, and mobility need to be followed by an increased sophistication in user interface design...
Sonja Gievska, John L. Sibert
DIM
2009
ACM
13 years 11 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
CSFW
1997
IEEE
13 years 9 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter