Sciweavers

1460 search results - page 96 / 292
» Meeting people where they are
Sort
View
CACM
2005
126views more  CACM 2005»
14 years 11 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
IACR
2011
87views more  IACR 2011»
13 years 11 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
80
Voted
ICIP
2008
IEEE
16 years 1 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
CHI
2004
ACM
16 years 6 days ago
Exploring PC-telephone convergence with the enhanced telephony prototype
Industry trends suggest that the PC and telephone user experiences will converge over the next several years. This convergence raises important questions for the HCI community: ho...
Jonathan J. Cadiz, Attila Narin, Gavin Jancke, Ano...
ICFP
2007
ACM
15 years 11 months ago
Tangible functional programming
We present a user-friendly approach to unifying program creation and execution, based on a notion of "tangible values" (TVs), which are visual and interactive manifestat...
Conal Elliott