Sciweavers

2421 search results - page 101 / 485
» Message from the Editor-in-Chief
Sort
View
APCHI
1998
IEEE
14 years 2 months ago
Beyond "Couch Potatoes": From Consumers to Designers
The fundamental challenge for computational media is to contribute to the invention and design of cultures in which humans can express themselves and engage in personally meaningf...
Gerhard Fischer
FOCS
2007
IEEE
14 years 4 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
ICPP
2007
IEEE
14 years 4 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
AUIC
2003
IEEE
14 years 3 months ago
Get a Way Back: Evaluating Retrieval from History Lists
Many user interfaces include history lists that help users retrieve temporally ordered information such as previously visited web pages, email messages, and recently used files. ...
Michael Jasonsmith, Andy Cockburn
CAEPIA
2003
Springer
14 years 3 months ago
Clustering Main Concepts from e-Mails
E–mail is one of the most common ways to communicate, assuming, in some cases, up to 75% of a company’s communication, in which every employee spends about 90 minutes a day in ...
Jesús S. Aguilar-Ruiz, Domingo S. Rodr&iacu...