Sciweavers

6770 search results - page 1150 / 1354
» How GPUs Work
Sort
View
CHI
2009
ACM
14 years 10 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
CHI
2009
ACM
14 years 10 months ago
Jadeite: improving API documentation using usage information
Jadeite is a new Javadoc-like API documentation system that takes advantage of multiple users' aggregate experience to reduce difficulties that programmers have learning new ...
Jeffrey Stylos, Brad A. Myers, Zizhuang Yang
CHI
2009
ACM
14 years 10 months ago
Sharing digital photographs in the home by tagging memorabilia
Abstract Within the home, digital photos lack the physical affordances that make collocated photo-sharing easy and opportunistic. Family members have difficulty accessing the perso...
Saul Greenberg, Michael Nunes
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 9 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
KDD
2009
ACM
262views Data Mining» more  KDD 2009»
14 years 9 months ago
Sentiment analysis of blogs by combining lexical knowledge with text classification
The explosion of user-generated content on the Web has led to new opportunities and significant challenges for companies, that are increasingly concerned about monitoring the disc...
Prem Melville, Wojciech Gryc, Richard D. Lawrence
« Prev « First page 1150 / 1354 Last » Next »