Sciweavers

1075 search results - page 180 / 215
» An environment for developing adaptive, multi-device user in...
Sort
View
CHI
2008
ACM
13 years 8 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
ISDO
2000
181views Business» more  ISDO 2000»
13 years 9 months ago
eFlow: an Open, Flexible and Configurable Approach to Service Composition
The Web is rapidly becoming the platform through which many companies deliver services to businesses and individual customers. E-Services are typically delivered point-to-point; h...
Fabio Casati
WWW
2006
ACM
14 years 8 months ago
XPath filename expansion in a Unix shell
Locating files based on file system structure, file properties, and maybe even file contents is a core task of the user interface of operating systems. By adapting XPath's po...
Kaspar Giger, Erik Wilde
CHI
2007
ACM
14 years 8 months ago
Expressing emotion in text-based communication
Our ability to express and accurately assess emotional states is central to human life. The present study examines how people express and detect emotions during text-based communi...
Jeffrey T. Hancock, Christopher Landrigan, Courtne...
CSFW
2004
IEEE
13 years 11 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann