Sciweavers

2421 search results - page 180 / 485
» Message from the Editor-in-Chief
Sort
View
87
Voted
ICICS
1997
Springer
15 years 6 months ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
CEAS
2006
Springer
15 years 5 months ago
Email Thread Reassembly Using Similarity Matching
Email thread reassembly is the task of linking messages by parentchild relationships. In this paper, we present two approaches to address this problem. One exploits previously und...
Jen-Yuan Yeh
107
Voted
VISSYM
2007
15 years 4 months ago
KeyStrokes: Personalizing Typed Text with Visualization
With the ubiquity of typed text, the style and much of the personality of handwriting has been lost from general communication. To counter this we introduce an artistic real-time ...
Petra Neumann, Annie Tat, Torre Zuk, M. Sheelagh T...
AVI
2008
15 years 4 months ago
Exploring the feasibility of video mail for illiterate users
We present work that explores whether the asynchronous peer-topeer communication capabilities of email can be made accessible to illiterate populations in the developing world. Bu...
Archana Prasad, Indrani Medhi, Kentaro Toyama, Rav...
103
Voted
CONEXT
2008
ACM
15 years 3 months ago
Social DTN routing
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...
Greg Bigwood, Tristan Henderson