Sciweavers

4445 search results - page 741 / 889
» Reflective Authorization Systems
Sort
View
CSCW
2008
ACM
15 years 6 months ago
Flashlight jigsaw: an exploratory study of an ad-hoc multi-player game on public displays
As large displays become prevalent in public spaces, they could be employed to create novel game experiences for the public. We present an exploratory study of an ad-hoc multiplay...
Xiang Cao, Michael Massimi, Ravin Balakrishnan
CSCW
2008
ACM
15 years 6 months ago
Transactive memory in trauma resuscitation
This paper describes an ethnographic study conducted to explore the possibilities for future design and development of technological support for trauma teams. We videotaped 10 tra...
Aleksandra Sarcevic, Ivan Marsic, Michael E. Lesk,...
137
Voted
CSCW
2008
ACM
15 years 6 months ago
A hybrid cultural ecology: world of warcraft in China
We analyze online gaming as a site of collaboration in a digital-physical hybrid. We ground our analysis in findings from an ethnographic study of the online game World of Warcraf...
Silvia Lindtner, Bonnie A. Nardi, Yang Wang 0005, ...
DOCENG
2008
ACM
15 years 6 months ago
Enabling adaptive time-based web applications with SMIL state
In this paper we examine adaptive time-based web applications (or presentations). These are interactive presentations where time dictates the major structure, and that require int...
Jack Jansen, Dick C. A. Bulterman
132
Voted
EDCC
2008
Springer
15 years 6 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger