Sciweavers

2421 search results - page 149 / 485
» Message from the Editor-in-Chief
Sort
View
ACMACE
2006
ACM
14 years 4 months ago
A massively multi-authored mobile surrealist book
In this paper we describe an innovative mobile game in the form a multi-authored book. Based upon the 1920s surrealist technique of “Exquisite Corpse”, the book builds from a ...
William Bamford, Paul Coulton, Reuben Edwards
AOSD
2006
ACM
14 years 4 months ago
Doxpects: aspects supporting XML transformation interfaces
In the web services environment software development can involve writing both object-oriented programs and XML transformations. This can be seen in the popular Web Services archit...
Eric Wohlstadter, Kris De Volder
CSCW
2006
ACM
14 years 4 months ago
Leveraging digital backchannels to enhance user experience in electronically mediated communication
Rendezvous is a conference call solution that leverages Voice over IP, enterprise calendaring, instant messaging, and rich client functionality to enhance the user experience and ...
Wendy A. Kellogg, Thomas Erickson, Tracee Vetting ...
IUI
2005
ACM
14 years 4 months ago
Automated email activity management: an unsupervised learning approach
Many structured activities are managed by email. For instance, a consumer purchasing an item from an e-commerce vendor may receive a message confirming the order, a warning of a ...
Nicholas Kushmerick, Tessa A. Lau
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 3 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz