Sciweavers

26354 search results - page 77 / 5271
» How we refactor, and how we know it
Sort
View
IEEESP
2010
115views more  IEEESP 2010»
13 years 7 months ago
How Internet Users' Privacy Concerns Have Evolved since 2002
In 2002, we established a baseline for Internet users’ online privacy values. Through a survey we found that information transfer, notice/awareness, and information storage were...
Annie I. Antón, Julia Brande Earp, Jessica ...
CHI
2007
ACM
14 years 9 months ago
How informances can be used in design ethnography
In this paper we discuss how we've adapted the technique of informance design for use in design ethnography. We detail our design ethnography workflow method and describe our...
Ron Wakkary, Madison Poon, Leah Maestri, Travis Ki...
SIGMOD
2006
ACM
162views Database» more  SIGMOD 2006»
14 years 9 months ago
Adaptive query processing: why, how, when, what next
Adaptive query processing has been the subject of a great deal of recent work, particularly in emerging data management environments such as data integration and data streams. We ...
Amol Deshpande, Joseph M. Hellerstein, Vijayshanka...
WAOA
2007
Springer
103views Algorithms» more  WAOA 2007»
14 years 3 months ago
Pricing Commodities, or How to Sell When Buyers Have Restricted Valuations
How should a seller price his goods in a market where each buyer prefers a single good among his desired goods, and will buy the cheapest such good, as long as it is within his bud...
Robert Krauthgamer, Aranyak Mehta, Atri Rudra
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry