Sciweavers

328 search results - page 42 / 66
» Identity-Enriched Session Management
Sort
View
WWW
2007
ACM
14 years 8 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
SIGCSE
2009
ACM
102views Education» more  SIGCSE 2009»
14 years 8 months ago
Preparation of high school computer science teachers: the Israeli perspective
This special session examines frameworks for the preparation of high school computer science (CS) teachers from the Israeli perspective. Specifically, several Israeli CS teacher p...
Judith Gal-Ezer, Orit Hazzan, Noa Ragonis
CHI
2006
ACM
14 years 8 months ago
Virtual information piles for small screen devices
We describe an implementation that has users `flick' notes, images, audio, and video files onto virtual piles beyond the display of small-screen devices. This scheme allows P...
QianYing Wang, Tony Hsieh, Meredith Ringel Morris,...
CHI
2004
ACM
14 years 8 months ago
Use of mobile appointment scheduling devices
One hundred thirty-eight subjects participated in a study on mobile appointment scheduling. Subjects completed a questionnaire on their primary method of managing appointments whe...
Thad Starner, Cornelis M. Snoeck, Benjamin A. Wong...
WWW
2010
ACM
14 years 2 months ago
Sync kit: a persistent client-side database caching toolkit for data intensive websites
We introduce a client-server toolkit called Sync Kit that demonstrates how client-side database storage can improve the performance of data intensive websites. Sync Kit is designe...
Edward Benson, Adam Marcus 0002, David R. Karger, ...