Sciweavers

3657 search results - page 141 / 732
» A Study of Practical Deduplication
Sort
View
CSCW
2008
ACM
14 years 17 days ago
Steps toward a typology for health informatics
In this paper we outline a typology, which will be useful for those engaged in the design and customization of information systems in healthcare. Drawing on ethnographic case stud...
Ellen Balka, Pernille Bjørn, Ina Wagner
CHI
2008
ACM
14 years 11 months ago
Sun dial: exploring techno-spiritual design through a mobile islamic call to prayer application
We present the design and formative evaluation of Sun Dial, an application that supports Muslims' prayer practices. We report on a study that involved identifying prayer as a...
Susan Wyche, Kelly E. Caine, Benjamin K. Davison, ...
PERVASIVE
2004
Springer
14 years 4 months ago
Siren: Context-aware Computing for Firefighting
Based on an extensive field study of current firefighting practices, we have developed a system called Siren to support tacit communication between firefighters with multiple level...
Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, K...
CODASPY
2012
12 years 6 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 6 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...