Sciweavers

1688 search results - page 317 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
15 years 3 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
138
Voted
BMCBI
2011
14 years 9 months ago
Worm Phenotype Ontology: integrating phenotype data within and beyond the C. elegans community
Background: Caenorhabditis elegans gene-based phenotype information dates back to the 1970’s, beginning with Sydney Brenner and the characterization of behavioral and morphologi...
Gary Schindelman, Jolene Fernandes, Carol Bastiani...
106
Voted
UIST
2006
ACM
15 years 7 months ago
Procedural haptic texture
We present the Haptic Shading Framework (HSF), a framework for procedurally defining haptic texture. HSF haptic texture shaders are short procedures allowing an application-progr...
Jeremy Shopf, Marc Olano
104
Voted
MSR
2005
ACM
15 years 7 months ago
Analysis of signature change patterns
Software continually changes due to performance improvements, new requirements, bug fixes, and adaptation to a changing operational environment. Common changes include modificatio...
Sunghun Kim, E. James Whitehead Jr., Jennifer Beva...
107
Voted
ICALT
2005
IEEE
15 years 7 months ago
Integrating Wireless Technology in Pocket Electronic Dictionary to Enhance Language Learning
We believe that with regard to the information technology applications in education, one student one computing device will be the future and long-term trend. Many related studies ...
Jen-Kai Liang, Tzu-Chien Liu, Hsue-Yie Wang, Tak-W...