Sciweavers

2061 search results - page 293 / 413
» Authorization for Metacomputing Applications
Sort
View
CHI
2005
ACM
15 years 6 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...
CRITICAL
2005
15 years 6 months ago
Comparing two approaches to context: realism and constructivism
During the last few years, there have been debates over what is context and how computers should act upon it. Two disparate camps of thought can be recognized. First, Realism, hav...
Antti Oulasvirta, Sakari Tamminen, Kristina Hö...
CSCW
2008
ACM
15 years 5 months ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
DATE
2008
IEEE
97views Hardware» more  DATE 2008»
15 years 5 months ago
Energy Efficient and High Speed On-Chip Ternary Bus
We propose two crosstalk reducing coding schemes using ternary busses. In addition to low power consumption and reduced delay, our schemes offer other advantages over binary codin...
Chunjie Duan, Sunil P. Khatri
ACSW
2007
15 years 5 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...