Sciweavers

2061 search results - page 123 / 413
» Authorization for Metacomputing Applications
Sort
View
CSCW
2012
ACM
13 years 12 months ago
Towards self-optimizing collaborative systems
Two important performance metrics in collaborative systems are local and remote response times. Previous analytical and simulation work has shown that these response times depend ...
Sasa Junuzovic, Prasun Dewan
IUI
2012
ACM
13 years 11 months ago
Towards automatic functional test execution
As applications are developed, functional tests ensure they continue to function as expected. Nowadays, functional testing is mostly done manually, with human testers verifying a ...
Pablo Pedemonte, Jalal Mahmud, Tessa Lau
IUI
2012
ACM
13 years 11 months ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
13 years 6 months ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy
CHI
2009
ACM
16 years 4 months ago
Sacred imagery in techno-spiritual design
Despite increased knowledge about how Information and Communications Technologies (ICTs) are used to support religious and spiritual practices, designers know little about how to ...
Susan Wyche, Kelly E. Caine, Benjamin K. Davison, ...