Sciweavers

6931 search results - page 1249 / 1387
» Context and Design Agents
Sort
View
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
13 years 10 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
FROCOS
2011
Springer
13 years 10 months ago
Tailoring Temporal Description Logics for Reasoning over Temporal Conceptual Models
Temporal data models have been used to describe how data can evolve in the context of temporal databases. Both the Extended Entity-Relationship (EER) model and the Unified Modelli...
Alessandro Artale, Roman Kontchakov, Vladislav Ryz...
HUC
2011
Springer
13 years 10 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
CSCW
2012
ACM
13 years 6 months ago
Practices of information and secrecy in a punk rock subculture
By examining the information practices of a punk-rock subculture, we investigate the limits of social media systems, particularly limits exposed by practices of secrecy. Looking a...
Jessica Lingel, Aaron Trammell, Joe Sanchez, Mor N...
86
Voted
CSCW
2012
ACM
13 years 6 months ago
Predicting tie strength in a new medium
We have friends we consider very close and acquaintances we barely know. The social sciences use the term tie strength to denote this differential closeness with the people in our...
Eric Gilbert
« Prev « First page 1249 / 1387 Last » Next »