Sciweavers

24529 search results - page 140 / 4906
» Computing on Authenticated Data
Sort
View
WWW
2004
ACM
16 years 3 months ago
Online feedback by tests and reporting for elearning and certification programs
The evaluation of eLearning success is an indispensable business requirement of education programs: the easy registration of `visits' to eLearning websites is, however, not s...
Dirk Bade, Georg Nüssel, Gerd Wilts
PERCOM
2003
ACM
16 years 2 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
16 years 4 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
JAMIA
2010
131views more  JAMIA 2010»
14 years 9 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
CLUSTER
2002
IEEE
15 years 2 months ago
Security Implications of Typical Grid Computing Usage Scenarios
A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to these...
Marty Humphrey, Mary R. Thompson