Sciweavers

2454 search results - page 337 / 491
» Privacy in the Information and Communications Technologies
Sort
View
SIGUCCS
2000
ACM
15 years 2 months ago
Three Years in the Solution Center
After thirty-plus years of making small “mid-course corrections” types of changes to the support paradigm, many on the Iowa State University campus thought it was time to make...
Frank Poduska
PCRCW
1997
Springer
15 years 2 months ago
ChaosLAN: Design and Implementation of a Gigabit LAN Using Chaotic Routing
In recent years, theChaos Project at theUniversityofWashingtonhas analyzed and simulated a dozen routing algorithms. Three new routing algorithms have been invented; of these, the...
Neil R. McKenzie, Kevin Bolding, Carl Ebeling, Law...
WWW
2002
ACM
15 years 10 months ago
Visualizing web site comparisons
The Web is increasingly becoming an important channel for conducting businesses, disseminating information, and communicating with people on a global scale. More and more companie...
Bing Liu, Kaidi Zhao, Lan Yi
97
Voted
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 4 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CHI
2010
ACM
15 years 5 months ago
Where there's a will there's a way: mobile media sharing in urban india
We present the results of a qualitative study of the sharing and consumption of entertainment media on low-cost mobile phones in urban India, a practice which has evolved into a v...
Thomas N. Smyth, Satish Kumar, Indrani Medhi, Kent...