Sciweavers

2478 search results - page 250 / 496
» Message from the Chair
Sort
View
105
Voted
CHI
2005
ACM
16 years 5 months ago
Communicating intimacy one bit at a time
In this paper, we present a study of `minimal intimate objects': low bandwidth devices for communicating intimacy for couples in long-distance relationships. We describe a us...
Joseph Kaye, Mariah K. Levitt, Jeffrey Nevins, Jes...
136
Voted
CHI
2004
ACM
16 years 5 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
248
Voted
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
16 years 4 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala
DCC
2003
IEEE
16 years 4 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
ICWS
2009
IEEE
16 years 1 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...