Computing in higher education: the Athena experience
Communications of the ACM - Special issue: computing in the frontiers of science and engineering
The ecology of computation
Optimal algorithms for Byzantine agreement
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
A protocol to set up shared secret schemes without the assistance of mutually trusted party
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Collaborative interface agents
AAAI '94 Proceedings of the twelfth national conference on Artificial intelligence (vol. 1)
The official PGP user's guide
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Social information filtering: algorithms for automating “word of mouth”
CHI '95 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Core Java
The Zephyr Help Instance: promoting ongoing activity in a CSCW system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Entertaining agents: a sociological case study
AGENTS '97 Proceedings of the first international conference on Autonomous agents
Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Life on the Screen: Identity in the Age of the Internet
Life on the Screen: Identity in the Age of the Internet
Hamlet on the Holodeck: The Future of Narrative in Cyberspace
Hamlet on the Holodeck: The Future of Narrative in Cyberspace
Decentralized A.I. 2
User''s Manual for the SMART Information Retrieval System
User''s Manual for the SMART Information Retrieval System
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Matchmaking for information agents
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
AAAI'96 Proceedings of the thirteenth national conference on Artificial intelligence - Volume 1
Towards Computation over Communities
Community Computing and Support Systems, Social Interaction in Networked Communities [the book is based on the Kyoto Meeting on Social Interaction and Communityware, held in Kyoto, Japan, in June 1998]
Shine: a peer-to-peer based framework of network community support systems
Computer Communications
Hi-index | 0.00 |
Shared interests often serve as the basis for the formation of community. Yet it is often difficult to find others on the net who share one's interests, due to the large size of the network, the difficulty of finding newsgroups, mailing lists, and discussion groups that reflect possibly unusual interests, and because most people do not often post. To address these issues, I have designed and am implementing Yenta, a system that safely and securely introduces people on the Internet who share some similar interests, and that enables the automatic formation of interest groups based on these shared interests. Yenta is a system of distributed, individual agents, each instantiation of which is run by an individual user. Each user's Yenta discovers its user's interests by direct examination of the user's personal files. It then finds groups of similar users without divulging sensitive information.