Sciweavers

53 search results - page 10 / 11
» Introducing social groups and group exchanges in the PopOrg ...
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 8 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
CHI
2010
ACM
13 years 11 months ago
Share: a programming environment for loosely bound cooperation
We introduce a programming environment entitled Share that is designed to encourage loosely bound cooperation between individuals within communities of practice through the sharin...
Yannick Assogba, Judith S. Donath
CSCW
2010
ACM
14 years 4 months ago
On the "localness" of user-generated content
The “localness” of participation in repositories of usergenerated content (UGC) with geospatial components has been cited as one of UGC’s greatest benefits. However, the deg...
Brent Hecht, Darren Gergle
GROUP
2003
ACM
14 years 22 days ago
Concepts for usable patterns of groupware applications
Patterns, which are based on in-depth practical experience, can be instructing for the design of groupware applications as sociotechnical systems. On the basis of a summary of the...
Thomas Herrmann, Marcel Hoffmann, Isa Jahnke, Andr...
CHI
2005
ACM
14 years 7 months ago
Patterns of media use in an activity-centric collaborative environment
This paper describes a new collaboration technology that is based on the support of lightweight, informally structured, opportunistic activities featuring heterogeneous threads of...
David R. Millen, Michael J. Muller, Werner Geyer, ...