Sciweavers

2061 search results - page 158 / 413
» Authorization for Metacomputing Applications
Sort
View
ICNP
2003
IEEE
15 years 9 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
HT
2003
ACM
15 years 9 months ago
Combining spatial and navigational structure in the hyper-hitchcock hypervideo editor
Existing hypertext systems have emphasized either the navigational or spatial expression of relationships between objects. We are exploring the combination of these modes of expre...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...
SIGDOC
2003
ACM
15 years 9 months ago
An interaction initiative model for documentation
In this paper we propose a model of creation and use of documentation based on the concept of mixed-initiative interaction. In our model, successful single-initiative interaction ...
David G. Novick, Karen Ward
SIGUCCS
2003
ACM
15 years 9 months ago
Making online training and support easier for everyone with viewlets
Online training and support objects can be difficult and timeconsuming to create. Written words are often ignored by users who want someone to show them a procedure. Viewlets are ...
Janice Ward
CADE
1998
Springer
15 years 8 months ago
Admissibility of Fixpoint Induction over Partial Types
Partial types allow the reasoning about partial functions in type theory. The partial functions of main interest are recursively computed functions, which are commonly assigned ty...
Karl Crary