Sciweavers

4731 search results - page 220 / 947
» Securing Interactive Programs
Sort
View
ECHT
1994
15 years 6 months ago
An Interaction Engine for Rich Hypertexts
In semantically rich hypertexts it is attractive to enable presentation of a network of nodes and links at different levels action. It is also important that the user can interact...
Kasper Østerbye, Kurt Nørmark
CHI
2005
ACM
16 years 2 months ago
Vista: interactive coffee-corner display
In the contemporary information-saturated world, there is a need for an easier, faster, and more social way to keep office workers updated and better aware of surrounding activiti...
Marcin Wichary, Lucy T. Gunawan, Nele Van den Ende...
104
Voted
ERCIMDL
2009
Springer
94views Education» more  ERCIMDL 2009»
15 years 9 months ago
A Visualization Technique for Quality Control of Massive Digitization Programs
Massive digitization programs need massive visualization techniques for quality control. We describe the functional prototype of a 3D interactive environment enabling a rapid inspe...
Rodrigo Andrade de Almeida, Pedro Alessio, Alexand...
CHI
2008
ACM
15 years 3 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
116
Voted
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...