Sciweavers

2250 search results - page 361 / 450
» Authorizing applications in singularity
Sort
View
154
Voted
CCS
2008
ACM
15 years 6 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
144
Voted
CSCW
2008
ACM
15 years 6 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
175
Voted
AVI
2010
15 years 6 months ago
Wakame: sense making of multi-dimensional spatial-temporal data
As our ability to measure the world around us improves, we are quickly generating massive quantities of high-dimensional, spatial-temporal data. In this paper, we concern ourselve...
Clifton Forlines, Kent Wittenburg
ICWSM
2008
15 years 6 months ago
StoryUpgrade: Finding Stories in Internet Weblogs
The phenomenal rise of Internet weblogging has created new opportunities for people to tell personal stories of their life experience, and the potential to share these stories wit...
Andrew S. Gordon, Reid Swanson
137
Voted
INFORMATIKTAGE
2008
15 years 6 months ago
Constraint Based Transformation Theory
During the last 25 years the complexity and functionality of software systems has increased dramatically. Software systems have to be updated and restructured continuously [22]. I...
Stefan Natelberg