Sciweavers

2902 search results - page 473 / 581
» The TheaterLoc Virtual Application
Sort
View
WWW
2008
ACM
14 years 11 months ago
Organizing the unorganized - employing IT to empower the under-privileged
Various sectors in developing countries are typically dominated by the presence of a large number of small and microbusinesses that operate in an informal, unorganized manner. Man...
Arun Kumar, Nitendra Rajput, Sheetal K. Agarwal, D...
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
14 years 11 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 11 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
CHI
2008
ACM
14 years 11 months ago
WallCology: designing interaction affordances for learner engagement in authentic science inquiry
The broadening array of technologies available to support the design of classroom activity has the potential to reshape science learning in schools. This paper presents a ubiquito...
Brenda López Silva, Brian Uphoff, Darshan B...
CHI
2005
ACM
14 years 11 months ago
Multi-monitor mouse
Multiple-monitor computer configurations significantly increase the distances that users must traverse with the mouse when interacting with existing applications, resulting in inc...
Hrvoje Benko, Steven Feiner