Sciweavers

578 search results - page 39 / 116
» Making PRIME usable
Sort
View
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
WWW
2009
ACM
14 years 8 months ago
Dataplorer: a scalable search engine for the data web
More and more structured information in the form of semantic data is nowadays available. It offers a wide range of new possibilities especially for semantic search and Web data in...
Haofen Wang, Qiaoling Liu, Gui-Rong Xue, Yong Yu, ...
CHI
2005
ACM
14 years 8 months ago
prefuse: a toolkit for interactive information visualization
Although information visualization (infovis) technologies have proven indispensable tools for making sense of complex data, wide-spread deployment has yet to take hold, as success...
Jeffrey Heer, Stuart K. Card, James A. Landay
CHI
2004
ACM
14 years 8 months ago
The temporal aspects of work for HCI
The general aim of the workshop is to explore the temporal aspects of work for Human-Computer Interaction (HCI). This position paper attempts to contribute to the exploration by p...
Peter J. Wild, Peter Johnson, Chris Roast, Mary Cz...
CHI
2003
ACM
14 years 8 months ago
Mobile computing in the retail arena
Although PDAs typically run applications in a "standalone" mode, they are increasingly equipped with wireless communications, which makes them useful in new domains. Thi...
Erica Newcomb, Toni Pashley, John T. Stasko