Sciweavers

16606 search results - page 3193 / 3322
» Context Modeling: Task Model and Practice Model
Sort
View
WWW
2005
ACM
16 years 4 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
144
Voted
WWW
2004
ACM
16 years 4 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
128
Voted
WWW
2004
ACM
16 years 4 months ago
Automatic detection of fragments in dynamically generated web pages
Dividing web pages into fragments has been shown to provide significant benefits for both content generation and caching. In order for a web site to use fragment-based content gen...
Lakshmish Ramaswamy, Arun Iyengar, Ling Liu, Fred ...
CHI
2009
ACM
16 years 4 months ago
Productive love: a new approach for designing affective technology
The importance of love is reflected in literature, movies and music, therefore it seems necessary to understand what role technology plays in relation to love and the roles it cou...
Ramon Solves Pujol, Hiroyuki Umemuro
149
Voted
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 4 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
« Prev « First page 3193 / 3322 Last » Next »