Sciweavers

1936 search results - page 285 / 388
» Unbundling Active Functionality
Sort
View
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
15 years 12 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
CHI
2008
ACM
15 years 12 months ago
Don't look now, but we've created a bureaucracy: the nature and roles of policies and rules in wikipedia
Wikis are sites that support the development of emergent, collective infrastructures that are highly flexible and open, suggesting that the systems that use them will be egalitari...
Brian S. Butler, Elisabeth Joyce, Jacqueline Pike
CHI
2008
ACM
15 years 12 months ago
Activity-based serendipitous recommendations with the Magitti mobile leisure guide
This paper presents a context-aware mobile recommender system, codenamed Magitti. Magitti is unique in that it infers user activity from context and patterns of user behavior and,...
Victoria Bellotti, James Bo Begole, Ed Huai-hsin C...
CHI
2007
ACM
15 years 12 months ago
Mobile kits and laptop trays: managing multiple devices in mobile information work
A study at a large IT company shows that mobile information workers frequently migrate work across devices (here: smartphones, desktop PCs, laptops). While having multiple devices...
Antti Oulasvirta, Lauri Sumari
95
Voted
CHI
2005
ACM
15 years 12 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...