Sciweavers

842 search results - page 60 / 169
» About the authors
Sort
View
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
12 years 1 days ago
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Abstract. In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the id...
Nelly Fazio, Irippuge Milinda Perera
CHI
2005
ACM
14 years 10 months ago
Testing the media equation with children
Designers of children's technology are often more interested in user motivation than those who design systems for adults. Since children's technology often has aims such...
Sonia Chiasson, Carl Gutwin
FDG
2009
ACM
14 years 4 months ago
A requirements analysis for videogame design support tools
Designing videogames involves weaving together systems of rules, called game mechanics, which support and structure compelling player experiences. Thus a significant portion of ga...
Mark J. Nelson, Michael Mateas
RE
2008
Springer
13 years 9 months ago
Design Science, Engineering Science and Requirements Engineering
For several decades there has been a debate in the computing sciences about the relative roles of design and empirical research, and about the contribution of design and research ...
Roel Wieringa, J. M. G. Heerkens
HT
2011
ACM
13 years 1 months ago
Personalisation in the wild: providing personalisation across semantic, social and open-web resources
One of the key motivating factors for information providers to use personalisation is to maximise the benefit to the user in accessing their content. However, traditionally such s...
Ben Steichen, Alexander O'Connor, Vincent Wade