Sciweavers

267 search results - page 18 / 54
» his 2008
Sort
View
CHI
2008
ACM
14 years 12 days ago
Healthcare in everyday life: designing healthcare services for daily life
Today the design of most healthcare technology is driven by the considerations of healthcare professionals and technology companies. This has several benefits, but we argue that t...
Stinne Aaløkke Ballegaard, Thomas Riisgaard...
ELPUB
2008
ACM
14 years 5 days ago
Autogeneous Authorization Framework for Open Access Information Management with Topic Maps
Conventional content management systems (CMSes) consider user management, specifically authorization to modify content objects to be orthogonal to any evolution of content within ...
Robert A. Barta, Markus W. Schranz
CORR
2008
Springer
115views Education» more  CORR 2008»
13 years 10 months ago
Compound Node-Kayles on Paths
In his celebrated book On Numbers and Games (Academic Press, New-York, 1976), J. H. Conway introduced twelve versions of compound games. We analyze these twelve versions for the N...
Adrien Guignard, Eric Sopena
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 10 months ago
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandi...
Gaëtan Le Guelvouit, Teddy Furon, Franç...
JCIT
2010
158views more  JCIT 2010»
13 years 5 months ago
Improvement of a Secure Convex Hull Two-Party Computation Protocol
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
Wenjie Zhao, Mingxing He