Sciweavers

8655 search results - page 47 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2008
ACM
14 years 9 months ago
Human-Currency Interaction: learning from virtual currency use in China
What happens when the domains of HCI design and money intersect? This paper presents analyses from an ethnographic study of virtual currency use in China to discuss implications f...
Scott D. Mainwaring, Yang Wang 0005
LCN
2008
IEEE
14 years 3 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
IPPS
2007
IEEE
14 years 3 months ago
Open Internet-based Sharing for Desktop Grids in iShare
This paper presents iShare, a distributed peer-to-peer Internet-sharing system, that facilitates the sharing of diverse resources located in different administrative domains over ...
Xiaojuan Ren, Ayon Basumallik, Zhelong Pan, Rudolf...
NDSS
2005
IEEE
14 years 2 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
OZCHI
2005
ACM
14 years 2 months ago
Personalisation in intelligent environments: managing the information flow
This paper describes research into the personalised delivery of information about an intelligent environment. The challenges we need to address are the dual forms of the Invisibili...
Craig Chatfield, David J. Carmichael, René ...