Sciweavers

826 search results - page 125 / 166
» A Virtual World for Network Management
Sort
View
JUCS
2006
133views more  JUCS 2006»
14 years 9 months ago
The Transformation of the Web: How Emerging Communities Shape the Information we Consume
: To date, one of the main aims of the World Wide Web has been to provide users with information. In addition to private homepages, large professional information providers, includ...
Josef Kolbitsch, Hermann A. Maurer
WWW
2010
ACM
15 years 4 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
PERCOM
2007
ACM
15 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
MOBISYS
2007
ACM
15 years 9 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
DBISP2P
2004
Springer
111views Database» more  DBISP2P 2004»
15 years 3 months ago
Processing and Optimization of Complex Queries in Schema-Based P2P-Networks
Peer-to-Peer infrastructures are emerging as one of the important data management infrastructures in the World Wide Web. So far, however, most work has focused on simple P2P networ...
Hadhami Dhraief, Alfons Kemper, Wolfgang Nejdl, Ch...