Sciweavers

2927 search results - page 186 / 586
» Secure Distributed Human Computation
Sort
View
NSPW
2006
ACM
15 years 8 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
OZCHI
2006
ACM
15 years 8 months ago
Saxaren: strengthening informal collaboration among geographically distributed teachers
For people working in situations with few colleagues around, information technology could be used for increased communication with colleagues at other places. One such group is te...
Kristina Groth, Sinna Lindquist, Cristian Bogdan, ...
ESORICS
2002
Springer
16 years 2 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith
CHI
2009
ACM
16 years 3 months ago
Design influence on social play in distributed exertion games
Exertion games are an emerging form of interactive games that require players to invest significant physical effort as part of the gameplay, rather than just pressing buttons. The...
Florian Mueller, Martin R. Gibbs, Frank Vetere
CHI
2008
ACM
16 years 2 months ago
OpenMessenger: gradual initiation of interaction for distributed workgroups
The initiation of interaction in face-to-face environments is a gradual process, and takes place in a rich information landscape of awareness, attention, and social signals. One o...
Jeremy P. Birnholtz, Carl Gutwin, Gonzalo Ramos, M...