Sciweavers

777 search results - page 77 / 156
» presence 2010
Sort
View
91
Voted
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
15 years 9 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
99
Voted
PEPM
2010
ACM
15 years 9 months ago
Making "stricterness" more relevant
Adapting a strictness analyser to have it take into account explicit strictness annotations can be a tricky business. Straightforward extensions of analyses based on relevance typ...
Stefan Holdermans, Jurriaan Hage
90
Voted
IUI
2010
ACM
15 years 9 months ago
Evaluating the design of inclusive interfaces by simulation
We have developed a simulator to help with the design and evaluation of assistive interfaces. The simulator can predict possible interaction patterns when undertaking a task using...
Pradipta Biswas, Peter Robinson
92
Voted
CSCW
2010
ACM
15 years 9 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
CVPR
2010
IEEE
15 years 9 months ago
Scale-Invariant heat kernel signatures for non-rigid shape recognition
One of the biggest challenges in non-rigid shape retrieval and comparison is the design of a shape descriptor that would maintain invariance under a wide class of transformations ...
Michael Bronstein, Iasonas Kokkinos