Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are...
Tightly-coupled interaction is shared work in which each person's actions immediately and continuously influence the actions of others. Tightly-coupled collaboration is a hal...
A proliferation of mobile devices in everyday life has increased the likelihood of technologically mediated interruptions. We examine ethnographic data from an SMSbased pervasive ...
Peter Tolmie, Andy Crabtree, Tom Rodden, Steve Ben...