Sciweavers

14190 search results - page 2610 / 2838
» computing 2008
Sort
View
148
Voted
CRYPTO
2008
Springer
120views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
Jean-Sébastien Coron, Jacques Patarin, Yann...
CSCW
2008
ACM
15 years 5 months ago
Leadership in online creative collaboration
Leadership plays a central role in the success of many forms of online creative collaboration, yet little is known about the challenges leaders must manage. In this paper, we repo...
Kurt Luther, Amy Bruckman
115
Voted
CSCW
2008
ACM
15 years 5 months ago
Can markets help?: applying market mechanisms to improve synchronous communication
There is a growing interest in applying market mechanisms to tackle everyday communication problems such as communication interruptions and communication overload. Prior analytic ...
Gary Hsieh, Robert Kraut, Scott E. Hudson, Roberto...
CSCW
2008
ACM
15 years 5 months ago
Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia
Wikipedia has become one of the most important information resources on the Web by promoting peer collaboration and enabling virtually anyone to edit anything. However, this mutab...
Aniket Kittur, Bongwon Suh, Ed H. Chi
126
Voted
CSCW
2008
ACM
15 years 5 months ago
It's all 'about you': diversity in online profiles
User profiles on today's social networking sites support only a small set of predefined questions. We report on an alternative way for users to richly describe themselves, by...
Casey Dugan, Werner Geyer, Michael J. Muller, Joan...
« Prev « First page 2610 / 2838 Last » Next »