Sciweavers

2927 search results - page 201 / 586
» Secure Distributed Human Computation
Sort
View
124
Voted
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
15 years 8 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
119
Voted
ACMDIS
2006
ACM
15 years 8 months ago
Supporting ethnographic studies of ubiquitous computing in the wild
Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their desig...
Andy Crabtree, Steve Benford, Chris Greenhalgh, Pa...
125
Voted
CW
2003
IEEE
15 years 7 months ago
Disappearing Computers, Social Actors and Embodied Agents
Presently, there are user interfaces that allow multimodal interactions. Many existing research and prototype systems introduced embodied agents, assuming that they allow a more n...
Anton Nijholt
139
Voted
IPPS
1998
IEEE
15 years 6 months ago
A Molecular Quasi-Random Model of Computations Applied to Evaluate Collective Intelligence
The paper presents how the Random PROLOG Processor (RPP), a bio-inspired model of computations, can be used for formalization and analysis of a phenomenon - the Collective Intelli...
Tadeusz Szuba
134
Voted
GCC
2004
Springer
15 years 8 months ago
Integrating Trust in Grid Computing Systems
A Grid computing system is a virtual resource framework. Inside the framework, resources are being shared among autonomous domains which can be geographically distributed. One prim...
Woodas W. K. Lai, Kam-Wing Ng, Michael R. Lyu