Sciweavers

962 search results - page 113 / 193
» Same places, same things, same people
Sort
View
ASIACRYPT
2001
Springer
14 years 2 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
CSCW
1998
ACM
14 years 1 months ago
Just Talk to Me: A Field Study of Expertise Location
Everyday, people in organizations must solve their problems to get their work accomplished. To do so, they often must find others with knowledge and information. Systems that assi...
David W. McDonald, Mark S. Ackerman
SIGGRAPH
1997
ACM
14 years 1 months ago
The two-user Responsive Workbench: support for collaboration through individual views of a shared space
We present the two-user Responsive Workbench: a projectionbased virtual reality system that allows two people to simultaneously view individual stereoscopic image pairs from their...
Maneesh Agrawala, Andrew C. Beers, Ian McDowall, B...
ACMACE
2007
ACM
14 years 1 months ago
Building a table tennis game for three players
Physical leisure activities such as table tennis provide healthy exercise and can offer a means to connect with others socially; however, players have to be in the same physical l...
Florian Mueller, Martin R. Gibbs
ADC
2009
Springer
151views Database» more  ADC 2009»
14 years 1 months ago
Unified Q-ary Tree for RFID Tag Anti-Collision Resolution
Radio Frequency Identification (RFID) technology uses radio-frequency waves to automatically identify people or objects. A large volume of data, resulting from the fast capturing ...
Prapassara Pupunwiwat, Bela Stantic