Sciweavers

3657 search results - page 532 / 732
» A Study of Practical Deduplication
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
15 years 7 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
CSCW
2008
ACM
15 years 7 months ago
Evaluating the deployment of a mobile technology in a hospital ward
Since health care teams are often distributed across time and location, information sharing is crucial for effective patient care. Studying the use of a mobile information technol...
Charlotte Tang, M. Sheelagh T. Carpendale
CSCW
2008
ACM
15 years 7 months ago
A hybrid cultural ecology: world of warcraft in China
We analyze online gaming as a site of collaboration in a digital-physical hybrid. We ground our analysis in findings from an ethnographic study of the online game World of Warcraf...
Silvia Lindtner, Bonnie A. Nardi, Yang Wang 0005, ...
155
Voted
DCOSS
2008
Springer
15 years 7 months ago
Frugal Sensor Assignment
When a sensor network is deployed in the field it is typically required to support multiple simultaneous missions, which may start and finish at different times. Schemes that match...
Matthew P. Johnson, Hosam Rowaihy, Diego Pizzocaro...
ICAIL
2007
ACM
15 years 7 months ago
Semantic Spaces and Multilingualism in the Law: The Challenge of Legal Knowledge Management
It is the concern of the author to arrange cogitations and experiences she gained by collaborating in relevant international project works, by conducting scientific studies regard...
Doris Liebwald