Sciweavers

2250 search results - page 141 / 450
» Authorizing applications in singularity
Sort
View
DOCENG
2006
ACM
15 years 4 months ago
Live editing of hypermedia documents
In some hypermedia system applications, like interactive digital TV applications, authoring and presentation of documents may have to be done concomitantly. This is the case of li...
Romualdo Monteiro de Resende Costa, Márcio ...
ICAT
2003
IEEE
15 years 3 months ago
i-ball 2: An Interaction Platform with a Crystal-Ball-Like Display for Multiple Users
The authors’ aim in this work is to develop an easy-to-use computer-human interaction (CHI) platform. In this paper, i-ball 2 (interactive/information ball 2) is introduced as a...
Keita Ushida, Hiroshi Harashima, Jun Ishikawa
FC
2008
Springer
82views Cryptology» more  FC 2008»
14 years 12 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
HCI
2007
14 years 11 months ago
Everyday Storytelling: Supporting the Mediated Expression of Online Personal Testimony
Personal stories make our everyday experiences memorable over time. This paper presents ‘Everyday Mediated Storytelling’, a model of the casual storyteller’s process of captu...
Aisling Kelliher, Glorianna Davenport
DBSEC
2000
110views Database» more  DBSEC 2000»
14 years 11 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...