Sciweavers

328 search results - page 42 / 66
» Identity-Enriched Session Management
Sort
View
61
Voted
WWW
2007
ACM
15 years 10 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SIGCSE
2009
ACM
102views Education» more  SIGCSE 2009»
15 years 10 months ago
Preparation of high school computer science teachers: the Israeli perspective
This special session examines frameworks for the preparation of high school computer science (CS) teachers from the Israeli perspective. Specifically, several Israeli CS teacher p...
Judith Gal-Ezer, Orit Hazzan, Noa Ragonis
CHI
2006
ACM
15 years 10 months ago
Virtual information piles for small screen devices
We describe an implementation that has users `flick' notes, images, audio, and video files onto virtual piles beyond the display of small-screen devices. This scheme allows P...
QianYing Wang, Tony Hsieh, Meredith Ringel Morris,...
51
Voted
CHI
2004
ACM
15 years 10 months ago
Use of mobile appointment scheduling devices
One hundred thirty-eight subjects participated in a study on mobile appointment scheduling. Subjects completed a questionnaire on their primary method of managing appointments whe...
Thad Starner, Cornelis M. Snoeck, Benjamin A. Wong...
WWW
2010
ACM
15 years 4 months ago
Sync kit: a persistent client-side database caching toolkit for data intensive websites
We introduce a client-server toolkit called Sync Kit that demonstrates how client-side database storage can improve the performance of data intensive websites. Sync Kit is designe...
Edward Benson, Adam Marcus 0002, David R. Karger, ...