Sciweavers

1213 search results - page 115 / 243
» Traceability for System Families
Sort
View
CCR
2010
97views more  CCR 2010»
14 years 10 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
85
Voted
CHI
2008
ACM
16 years 1 months ago
What drives content tagging: the case of photos on Flickr
We examine tagging behavior on Flickr, a public photosharing website. We build on previous qualitative research that exposed a taxonomy of tagging motivations, as well as on socia...
Oded Nov, Mor Naaman, Chen Ye
100
Voted
OSDI
2008
ACM
16 years 1 months ago
Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test
Hard disk drives returned back to Seagate undergo the Field Return Incoming Test. During the test, the available logs in disk drives are collected, if possible. These logs contain...
Alma Riska, Erik Riedel
CHI
2010
ACM
15 years 7 months ago
Sharing conversation and sharing life: video conferencing in the home
Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, we still do not ha...
Tejinder K. Judge, Carman Neustaedter
142
Voted
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
15 years 6 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes