Sciweavers

3451 search results - page 599 / 691
» Collaborative attack modeling
Sort
View
CHI
2001
ACM
14 years 8 months ago
The impact of eye gaze on communication using humanoid avatars
In this paper we describe an experiment designed to investigate the importance of eye gaze in humanoid avatars representing people engaged in conversation. We compare responses to...
Maia Garau, Mel Slater, Simon Bee, Martina Angela ...
CHI
2001
ACM
14 years 8 months ago
Single display privacyware: augmenting public displays with private information
The research area of Single Display Groupware (SDG) confronts the standard model of computing interaction, one user working on one computer, by investigating how to best support g...
Garth B. D. Shoemaker, Kori Inkpen
MOBIHOC
2008
ACM
14 years 7 months ago
A game approach for multi-channel allocation in multi-hop wireless networks
Channel allocation was extensively investigated in the framework of cellular networks, but it was rarely studied in the wireless ad-hoc networks, especially in the multi-hop ad-ho...
Lin Gao, Xinbing Wang
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 4 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
CSCW
2010
ACM
14 years 4 months ago
Gone but not forgotten: designing for disconnection in synchronous groupware
Synchronous groupware depends on the assumption that people are fully connected to the others in the group, but there are many situations (network delay, network outage, or explic...
Carl Gutwin, T. C. Nicholas Graham, Christopher Wo...