Sciweavers

3451 search results - page 132 / 691
» Collaborative attack modeling
Sort
View
CSCWD
2005
Springer
15 years 8 months ago
Towards an engineering approach for groupware development: learning from the AulaNet LMS development
This paper presents the AulaNet learning management system, its architecture and the collaboration model that guided its development and that was refined during this process. A ca...
Marco Aurélio Gerosa, Mariano Gomes Pimente...
ECSCW
2007
15 years 3 months ago
Semi-Synchronous Conflict Detection and Resolution in Asynchronous Software Development
Previous work has found that (a) when software is developed collaboratively, concurrent accesses to related pieces of code are made, and (b) when these accesses are coordinated asy...
Prasun Dewan, Rajesh Hegde
EUROCRYPT
2005
Springer
15 years 8 months ago
Related-Key Boomerang and Rectangle Attacks
This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciph...
Eli Biham, Orr Dunkelman, Nathan Keller
113
Voted
CHI
2008
ACM
16 years 2 months ago
Collaborative interaction with volumetric displays
Volumetric displays possess a number of unique properties which potentially make them particularly suitable for collaborative 3D applications. Because such displays have only rece...
Tovi Grossman, Ravin Balakrishnan
CHI
2005
ACM
16 years 2 months ago
Patterns of media use in an activity-centric collaborative environment
This paper describes a new collaboration technology that is based on the support of lightweight, informally structured, opportunistic activities featuring heterogeneous threads of...
David R. Millen, Michael J. Muller, Werner Geyer, ...