Sciweavers

2631 search results - page 53 / 527
» Less is More
Sort
View
INTERACT
2007
13 years 10 months ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu
ECIR
2006
Springer
13 years 10 months ago
The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria
This paper presents an experimental study on the effect of topic familiarity on the assessment behaviour of online searchers. In particular we investigate the effect of topic famil...
Lei Wen, Ian Ruthven, Pia Borlund
DGO
2003
118views Education» more  DGO 2003»
13 years 10 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
SFP
2001
13 years 10 months ago
The Dual of Substitution is Redecoration
: It is well known that type constructors of incomplete trees (trees with variables) carry the structure of a monad with substitution as the extension operation. Less known are the...
Tarmo Uustalu, Varmo Vene
AMC
2007
184views more  AMC 2007»
13 years 9 months ago
Elliptic curve scalar multiplication algorithm using complementary recoding
Elliptic curve based cryptosystem is an efficient public key cryptosystem, which is more suitable for limited environments. The very expensive operation in elliptic curve based cr...
P. Balasubramaniam, E. Karthikeyan