Sciweavers

2795 search results - page 363 / 559
» Recommended or Not
Sort
View
CHI
2010
ACM
14 years 5 months ago
Lessons learned from blog muse: audience-based inspiration for bloggers
Blogging in the enterprise is increasingly popular and recent research has shown that there are numerous benefits for both individuals and the organization, e.g. developing reputa...
Casey Dugan, Werner Geyer, David R. Millen
CHI
2010
ACM
14 years 5 months ago
Towards customizable games for stroke rehabilitation
Stroke is the leading cause of long term disability among adults in industrialized nations. The partial paralysis that stroke patients often experience can make independent living...
Gazihan Alankus, Amanda Lazar, Matt May, Caitlin K...
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
EDBT
2010
ACM
200views Database» more  EDBT 2010»
14 years 5 months ago
Rewrite techniques for performance optimization of schema matching processes
A recurring manual task in data integration, ontology alignment or model management is finding mappings between complex meta data structures. In order to reduce the manual effor...
Eric Peukert, Henrike Berthold, Erhard Rahm
EDBTW
2010
Springer
14 years 5 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...