Sciweavers

8655 search results - page 308 / 1731
» Challenges for Trusted Computing
Sort
View
123
Voted
HPCN
1999
Springer
15 years 7 months ago
Computational Experiments using Distributed Tools in a Web-Based Electronic Notebook Environment
Abstract. Computational environments used by scientists should provide high-level support for scientific processes that involve the integrated ematic use of familiar abstractions f...
Allen D. Malony, Jenifer L. Skidmore, Matthew J. S...
115
Voted
ACMIDC
2010
15 years 7 months ago
BeeSim: leveraging wearable computers in participatory simulations with young children
New technologies have enabled students to become active participants in computational simulations of dynamic and complex systems (called Participatory Simulations), providing a &q...
Kylie A. Peppler, Joshua A. Danish, Benjamin Zaitl...
118
Voted
CSE
2009
IEEE
15 years 6 months ago
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments
—Context, the pieces of information that capture the characteristics of ubiquitous computing environment, is often imprecise and incomplete due to user mobility, unreliable wirel...
Daqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Gu...
123
Voted
ACE
2004
184views Education» more  ACE 2004»
15 years 4 months ago
From Informal to Formal: Creating the Australasian Computing Education Community
The advent of Web technology has enabled new ways in which groups of people may interact, leading to the development of online communities. In an academic environment these virtua...
Judy Sheard, Angela Carbone
143
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 3 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao