Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Nathaniel Husted"'
Publikováno v:
ACM SIGCAS Computers and Society. 44:11-15
The traditional approaches to encourage gamers to exercise have been two-fold: incorporating in-game incentives and designing games that are based on exercise. We discuss the drawbacks of these approaches and introduce two new design constructs: faci
Autor:
Steven Myers, Nathaniel Husted
Publikováno v:
NSPW
The notion of emergent properties is becoming common place in the physical and social sciences, with applications in physics, chemistry, biology, medicine, economics, and sociology. Unfortunately, little attention has been given to the discussion of
Publikováno v:
ACSAC
Recent work demonstrates the feasibility and practical use of secure two-party computation [5, 9, 15, 23]. In this work, we present the first Graphical Processing Unit (GPU)-optimized implementation of an optimized Yao's garbled-circuit protocol for
Autor:
Nathaniel Husted, Steven Myers, Mayank Dhiman, Markus Jakobsson, Bruno Gonçalves, Michael Conover, Filippo Menczer
Publikováno v:
The Death of the Internet
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c3e722c48e77fcb9165bf573320f1911
https://doi.org/10.1002/9781118312551.ch6
https://doi.org/10.1002/9781118312551.ch6
Publikováno v:
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies.
Smartphones are becoming a dominant form of mobile computing in the United States, and more slowly, the world. The smartphone, as a platform, blends a traditional general computing platform with a specialized mobile phone platform. However, each plat
Publikováno v:
eCrime Researchers Summit
Governments and inter-governmental organizations are developing cross-jurisdictional mechanisms to decrease global digital crime. The underlying assumption is that the loss incurred from ODC decreases social welfare in every jurisdiction. In this pap
Publikováno v:
WPES
Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems
Autor:
Steven Myers, Nathaniel Husted
Publikováno v:
ACM Conference on Computer and Communications Security
Digital wireless radios broadcast identification numbers that uniquely identify them. As has been previously observed, given the ubiquity with which people carry smartphones with their embedded WiFi radios powered on, comes the ability to track indiv