Sciweavers

871 search results - page 43 / 175
» A Decentralized Authorization Architecture
Sort
View
CHI
2009
ACM
15 years 10 months ago
An elementary social information foraging model
User interfaces and information systems have become increasingly social in recent years, aimed at supporting the decentralized, cooperative production and use of content. A theory...
Peter Pirolli
CHI
2004
ACM
15 years 10 months ago
Professional usability in open source projects: GNOME, OpenOffice.org, NetBeans
Working as a usability professional in the open source arena is a challenging task. The decentralized and engineering-driven approach of open source projects can be at odds with c...
Calum Benson, Jiri Mzourek, Matthias Müller-P...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 3 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ECSCW
2007
14 years 11 months ago
How-To Pages: Informal Systems of Expertise Sharing
The How-To has recently emerged as a genre of online content that describes how something is done. This study focuses on computer and electronics hobbyists and their use of How-Tos...
Cristen Torrey, David W. McDonald, Bill N. Schilit...
TSP
2010
14 years 4 months ago
Greedy gossip with eavesdropping
Abstract-- This paper presents greedy gossip with eavesdropping (GGE), a new average consensus algorithm for wireless sensor network applications. Consensus algorithms have recentl...
Deniz Üstebay, Boris N. Oreshkin, Mark Coates...