Sciweavers

256 search results - page 6 / 52
» What You Store is What You Get
Sort
View
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
13 years 11 months ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
DEBU
1998
95views more  DEBU 1998»
13 years 7 months ago
What can you do with a Web in your Pocket?
The amount of information available online has grown enormously over the past decade. Fortunately, computing power, disk capacity, and network bandwidth have also increased dramat...
Sergey Brin, Rajeev Motwani, Lawrence Page, Terry ...
CHI
2006
ACM
14 years 8 months ago
Feeling what you hear: tactile feedback for navigation of audio graphs
Access to digitally stored numerical data is currently very limited for sight impaired people. Graphs and visualizations are often used to analyze relationships between numerical ...
Steven A. Wall, Stephen A. Brewster
SIGIR
2006
ACM
14 years 1 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
WWW
2008
ACM
14 years 8 months ago
R-U-in?: doing what you like, with people whom you like
This paper presents R-U-In? ? a social networking application that leverages Web 2.0 and IMS-based Converged Networks technologies to create a rich next-generation service. R-U-In...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...