Sciweavers

2250 search results - page 165 / 450
» Authorizing applications in singularity
Sort
View
100
Voted
ESWS
2009
Springer
15 years 4 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
HT
2009
ACM
15 years 4 months ago
ArsMeteo: artworks and tags floating over the planet art
In this paper we present ArsMeteo◦ , a Web 2.0 portal for collecting and sharing digital (or digitalized) artworks, like videos, pictures, poems and music. The ArsMeteo◦ conte...
Edoardo Acotto, Matteo Baldoni, Cristina Baroglio,...
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
15 years 4 months ago
Towards a Methodology for the Development of Integrated IT Infrastructures
In this paper, the authors propose and validate a methodology for the development of integrated Information Technology (IT) infrastructures. The motivation for putting forward a n...
ACMDIS
2006
ACM
15 years 4 months ago
Wikifying your interface: facilitating community-based interface translation
We explore the application of a wiki-based technology and style of interaction to enabling the incremental translation of a collaborative application into a number of different la...
M. Cameron Jones, Dinesh Rathi, Michael B. Twidale
66
Voted
ICALT
2005
IEEE
15 years 3 months ago
Flexible and Exploratory Learning by Polyscopic Topic Maps
Flexible and active education calls for a comprehensive restructuring of the traditional university course format. Such restructuring can be done in a natural and coherent way by ...
Dino Karabeg, Rolf Guescini, Tommy W. Nordeng