Sciweavers

846 search results - page 135 / 170
» Broadening Our Collaboration with Design
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 5 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
WWW
2010
ACM
14 years 3 months ago
Autonomous resource provisioning for multi-service web applications
Dynamic resource provisioning aims at maintaining the endto-end response time of a web application within a predefined SLA. Although the topic has been well studied for monolithi...
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi
CHI
2010
ACM
14 years 3 months ago
Fitting an activity-centric system into an ecology of workplace tools
Knowledge workers expend considerable effort managing fragmentation, characterized by constant switching among digital artifacts, when executing work activities. Activitycentric c...
Aruna D. Balakrishnan, Tara Matthews, Thomas P. Mo...
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
14 years 3 months ago
Applying a ThinkLet- and ThinXel-Based Group Process Modeling Language: A Prototype of a Universal Group Support System
Group Support Systems (GSS) can improve the productivity of Group Work by offering a variety of tools to assist a virtual group across geographical distances. Experience shows tha...
Stefan Werner Knoll, Martin Hörning, Graham H...
CSE
2009
IEEE
14 years 3 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...