Sciweavers

673 search results - page 48 / 135
» Authoring of Adaptive and Adaptable Hypermedia
Sort
View
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
CHI
2009
ACM
14 years 9 months ago
Fly: a tool to author planar presentations
Modern presentation software is still built around interaction metaphors adapted from traditional slide projectors. We provide an analysis of the problems in this application genr...
Leonhard Lichtschlag, Thorsten Karrer, Jan O. Borc...
AIED
2005
Springer
14 years 2 months ago
Evaluating a Mixed-Initiative Authoring Environment: Is REDEEM for Real?
The REDEEM authoring tool allows teachers to create adapted learning environments for their students from existing material. Previous evaluations have shown that under experimental...
Shaaron Ainsworth, Piers Fleming
ACL
2006
13 years 10 months ago
Obfuscating Document Stylometry to Preserve Author Anonymity
This paper explores techniques for reducing the effectiveness of standard authorship attribution techniques so that an author A can preserve anonymity for a particular document D....
Gary Kacmarcik, Michael Gamon
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 9 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud