Sciweavers

122 search results - page 13 / 25
» Trust and technologies: Implications for organizational work...
Sort
View
CSCW
2006
ACM
14 years 2 months ago
The human infrastructure of cyberinfrastructure
Despite their rapid proliferation, there has been little examination of the coordination and social practices of cyberinfrastructure projects. We use the notion of "human inf...
Charlotte P. Lee, Paul Dourish, Gloria Mark
DBSEC
2007
104views Database» more  DBSEC 2007»
13 years 10 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
VOTEID
2007
Springer
14 years 2 months ago
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulat...
Jens-Matthias Bohli, Jörn Müller-Quade, ...
CGF
2005
136views more  CGF 2005»
13 years 8 months ago
Practical CFD Simulations on Programmable Graphics Hardware using SMAC
The explosive growth in integration technology and the parallel nature of rasterization-based graphics APIs changed the panorama of consumer-level graphics: today, GPUs are cheap,...
Carlos Eduardo Scheidegger, João Luiz Dihl ...
ECSCW
1997
13 years 9 months ago
Supporting the Flow of Information Through Constellations of Interaction
Abstract: In field studies designed to uncover opportunities for computationallyintensive business applications, we observed an interaction pattern we term "constellations&quo...
Tony Salvador, Sara A. Bly