Sciweavers

1018 search results - page 141 / 204
» Remote User Authentication Using Public Information
Sort
View
WWW
2005
ACM
14 years 8 months ago
ATMEN: a triggered network measurement infrastructure
Web performance measurements and availability tests have been carried out using a variety of infrastructures over the last several years. Disruptions in the Internet can lead to W...
Balachander Krishnamurthy, Harsha V. Madhyastha, O...
FDG
2009
ACM
14 years 2 months ago
Exploring 3D gestural interfaces for music creation in video games
In recent years the popularity of music and rhythm-based games has experienced tremendous growth. However almost all of these games require custom hardware to be used as input dev...
Jared N. Bott, James G. Crowley, Joseph J. LaViola...
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 2 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
HPDC
2010
IEEE
13 years 9 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
CSCW
2008
ACM
13 years 9 months ago
Are you sleeping?: sharing portrayed sleeping status within a social network
Within a group of peers, it is often useful or interesting to know whether someone in the group has gone to bed or whether they have awakened in the morning. This information, nat...
Sunyoung Kim, Julie A. Kientz, Shwetak N. Patel, G...