Sciweavers

516 search results - page 88 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CHI
2010
ACM
14 years 3 months ago
d.note: revising user interfaces through change tracking, annotations, and alternatives
Interaction designers typically revise user interface prototypes by adding unstructured notes to storyboards and screen printouts. How might computational tools increase the effic...
Björn Hartmann, Sean Follmer, Antonio Ricciar...
BMCBI
2008
142views more  BMCBI 2008»
13 years 8 months ago
Optimal neighborhood indexing for protein similarity search
Background: Similarity inference, one of the main bioinformatics tasks, has to face an exponential growth of the biological data. A classical approach used to cope with this data ...
Pierre Peterlongo, Laurent Noé, Dominique L...
CHI
2009
ACM
14 years 3 months ago
O' game, can you feel my frustration?: improving user's gaming experience via stresscam
One of the major challenges of video game design is to have appropriate difficulty levels for users in order to maximize the entertainment value of the game. Game players may lose...
Chang Yun, Dvijesh Shastri, Ioannis Pavlidis, Zhig...
SIGIR
2006
ACM
14 years 2 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
14 years 2 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...