Sciweavers

5064 search results - page 947 / 1013
» Web Information Management System: Personalization and Gener...
Sort
View
CCS
2008
ACM
14 years 11 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ASSETS
2008
ACM
14 years 11 months ago
Slide rule: making mobile touch screens accessible to blind people using multi-touch interaction techniques
Recent advances in touch screen technology have increased the prevalence of touch screens and have prompted a wave of new touch screen-based devices. However, touch screens are st...
Shaun K. Kane, Jeffrey P. Bigham, Jacob O. Wobbroc...
BCSHCI
2009
14 years 11 months ago
Measuring the influence of social abilities on acceptance of an interface robot and a screen agent by elderly users
Personal robots and screen agents can be equipped with social abilities to facilitate interaction. This paper describes our research on the influence of these abilities on elderly...
Marcel Heerink, Ben J. A. Kröse, Bob J. Wieli...
SIGMETRICS
2008
ACM
128views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation
Local network coding is growing in prominence as a technique to facilitate greater capacity utilization in multi-hop wireless networks. A specific objective of such local network ...
Shravan K. Rayanchu, Sayandeep Sen, Jianming Wu, S...
NOSSDAV
2010
Springer
15 years 2 months ago
Towards understanding the external links of video sharing sites: measurement and analysis
Recently, many video sharing sites provide external links so that their video or audio contents can be embedded into external web sites. For example, users can copy the embedded U...
Kunfeng Lai, Dan Wang