Sciweavers

2061 search results - page 106 / 413
» Authorization for Metacomputing Applications
Sort
View
IUI
2009
ACM
16 years 1 months ago
Multi-touch interaction for robot control
Recent developments in multi-touch technologies have exposed fertile ground for research in enriched humanrobot interaction. Although multi-touch technologies have been used for v...
Mark Micire, Jill L. Drury, Brenden Keyes, Holly A...
ISECS
2008
IEEE
15 years 10 months ago
Key Technology and System Design in Mobile Supply Chain Management
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations....
Qi Yuan, Zhao Xiaokang, Zhang Qiong
113
Voted
AIED
2007
Springer
15 years 10 months ago
Taking advantage of the Semantics of a Lesson Graph based on Learning Objects
Lesson graphs are composed of Learning Objects (LOs) and include a valuable amount of information about the content and usage of the LOs, described by the LO metadata. Graphs also ...
Olivier Motelet, Nelson Baloian, Benjamin Piwowars...
IEEECIT
2005
IEEE
15 years 9 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
PODC
2005
ACM
15 years 9 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod