Sciweavers

2250 search results - page 132 / 450
» Authorizing applications in singularity
Sort
View
ISECS
2008
IEEE
15 years 4 months ago
Key Technology and System Design in Mobile Supply Chain Management
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations....
Qi Yuan, Zhao Xiaokang, Zhang Qiong
AIED
2007
Springer
15 years 4 months ago
Taking advantage of the Semantics of a Lesson Graph based on Learning Objects
Lesson graphs are composed of Learning Objects (LOs) and include a valuable amount of information about the content and usage of the LOs, described by the LO metadata. Graphs also ...
Olivier Motelet, Nelson Baloian, Benjamin Piwowars...
IEEECIT
2005
IEEE
15 years 3 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
PODC
2005
ACM
15 years 3 months ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
MIS
2005
Springer
158views Multimedia» more  MIS 2005»
15 years 3 months ago
Context-Based Management of Multimedia Documents in 3D Navigational Environments
Abstract. This work proposes an approach for managing multimedia information associated to 3D environments navigated by the user. The influence of context (location, user profile, ...
Fabio Pittarello