Sciweavers

2927 search results - page 91 / 586
» Secure Distributed Human Computation
Sort
View
EUROCRYPT
2003
Springer
14 years 2 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
ICNP
2003
IEEE
14 years 2 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
CHI
2007
ACM
14 years 9 months ago
Biases in human estimation of interruptibility: effects and implications for practice
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Daniel Avrahami, James Fogarty, Scott E. Hudson
ATC
2006
Springer
13 years 11 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
ISWC
1998
IEEE
14 years 1 months ago
Speaking and Listening on the Run: Design for Wearable Audio Computing
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...
Nitin "Nick" Sawhney, Chris Schmandt