Sciweavers

3891 search results - page 687 / 779
» Toward nature-inspired computing
Sort
View
143
Voted
CHI
2010
ACM
15 years 10 months ago
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
122
Voted
CHI
2010
ACM
15 years 10 months ago
End-user mashup programming: through the design lens
Programming has recently become more common among ordinary end users of computer systems. We believe that these end-user programmers are not just coders but also designers, in tha...
Jill Cao, Yann Riche, Susan Wiedenbeck, Margaret M...
130
Voted
IEEEARES
2009
IEEE
15 years 10 months ago
Routing Protocol Security Using Symmetric Key Based Techniques
—In this paper, we address the security of routing protocols. Internet routing protocols are subject to attacks in the control plane as well as the data plane. In the control pla...
Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poor...
141
Voted
CSE
2009
IEEE
15 years 10 months ago
A Language of Life: Characterizing People Using Cell Phone Tracks
—Mobile devices can produce continuous streams of data which are often specific to the person carrying them. We show that cell phone tracks from the MIT Reality dataset can be u...
Alexy Khrabrov, George Cybenko
139
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...