Sciweavers

2061 search results - page 212 / 413
» Authorization for Metacomputing Applications
Sort
View
ICIP
2006
IEEE
16 years 6 months ago
An Approach to Distributed Video Coding Using 3D Face Models
Distributed Source Coding (DSC), formulated thirty years ago, is lately witnessing a great research effort. This effort is encouraged by emerging new applications that could great...
Xavier Artigas, Luis Torres
CCS
2009
ACM
16 years 5 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
CHI
2009
ACM
16 years 5 months ago
Why and why not explanations improve the intelligibility of context-aware intelligent systems
Context-aware intelligent systems employ implicit inputs, and make decisions based on complex rules and machine learning models that are rarely clear to users. Such lack of system...
Brian Y. Lim, Anind K. Dey, Daniel Avrahami
CHI
2009
ACM
16 years 5 months ago
Comparison of three one-question, post-task usability questionnaires
Post-task ratings of difficulty in a usability test have the potential to provide diagnostic information and be an additional measure of user satisfaction. But the ratings need to...
Jeff Sauro, Joseph S. Dumas
CHI
2009
ACM
16 years 5 months ago
What's in Wikipedia?: mapping topics and conflict using socially annotated category structure
Wikipedia is an online encyclopedia which has undergone tremendous growth. However, this same growth has made it difficult to characterize its content and coverage. In this paper ...
Aniket Kittur, Ed H. Chi, Bongwon Suh