Sciweavers

7839 search results - page 1437 / 1568
» What's there and what's not
Sort
View
PET
2010
Springer
15 years 3 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
ECLIPSE
2005
ACM
15 years 3 months ago
Coping with an open bug repository
Most open source software development projects include an open bug repository—one to which users of the software can gain full access—that is used to report and track problems...
John Anvik, Lyndon Hiew, Gail C. Murphy
CLEF
2008
Springer
15 years 3 months ago
A Study of Users' Image Seeking Behaviour in FlickLing
This study aims to explore users' image seeking behaviour when searching for a known, non-annotated image in Flickling provided by iCLEF2008 track. The task assigned to users...
Evgenia Vassilakaki, Frances C. Johnson, Richard J...
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
CSCW
2008
ACM
15 years 3 months ago
Understanding the implications of social translucence for systems supporting communication at work
In this paper we describe a study that explored the implications of the Social Translucence framework for designing systems that support communications at work. Two systems design...
Agnieszka Matysiak Szóstek, Evangelos Karap...
« Prev « First page 1437 / 1568 Last » Next »