Sciweavers

5790 search results - page 697 / 1158
» Distributed programming with distributed authorization
Sort
View
PERCOM
2005
ACM
16 years 3 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
IUI
2010
ACM
16 years 26 days ago
Speeding pointing in tiled widgets: understanding the effects of target expansion and misprediction
Target expansion is a pointing facilitation technique where the users target, typically an interface widget, is dynamically enlarged to speed pointing in interfaces. However, with...
Jaime Ruiz, Edward Lank
CSCW
2010
ACM
16 years 26 days ago
Eliciting and focusing geographic volunteer work
Open content communities such as wikis derive their value from the work done by users. However, a key challenge is to elicit work that is sufficient and focused where needed. We ...
Reid Priedhorsky, Mikhil Masli, Loren G. Terveen
134
Voted
CSCW
2010
ACM
16 years 26 days ago
Gone but not forgotten: designing for disconnection in synchronous groupware
Synchronous groupware depends on the assumption that people are fully connected to the others in the group, but there are many situations (network delay, network outage, or explic...
Carl Gutwin, T. C. Nicholas Graham, Christopher Wo...
CHI
2010
ACM
15 years 11 months ago
ManyNets: an interface for multiple network analysis and visualization
Traditional network analysis tools support analysts in studying a single network. ManyNets offers these analysts a powerful new approach that enables them to work on multiple netw...
Manuel Freire, Catherine Plaisant, Ben Shneiderman...