Sciweavers

CACM
2005
42views more  CACM 2005»
13 years 4 months ago
Secure knowledge management and the semantic web
JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, R...
CACM
2005
64views more  CACM 2005»
13 years 4 months ago
Privacy and trust issues with invisible computers
Saadi Lahlou, Marc Langheinrich, Carsten Röck...
CACM
2005
77views more  CACM 2005»
13 years 4 months ago
Crisis and opportunity in computer science
Maria M. Klawe, Ben Shneiderman
CACM
2005
126views more  CACM 2005»
13 years 4 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
CACM
2005
58views more  CACM 2005»
13 years 4 months ago
The bubble of web visibility
Marco Gori, Ian H. Witten
CACM
2005
52views more  CACM 2005»
13 years 4 months ago
Shape-based retrieval and analysis of 3d models
Thomas A. Funkhouser, Michael M. Kazhdan, Patrick ...
CACM
2005
35views more  CACM 2005»
13 years 4 months ago
Why do people hate spyware?
Lee A. Freeman, Andrew Urbaczewski