Sciweavers

3276 search results - page 179 / 656
» Data Management for Pervasive Computing
Sort
View
127
Voted
CSCWD
2006
Springer
15 years 8 months ago
A Process Traceability Methodology to Support Conflict Management
The process of collaborative engineering design is relatively complex, and often results in various conflicts due to multi-actors interactions. Therefore, a critical element of co...
Mohamed-Zied Ouertani, Lilia Gzara Yesilbas, Gabri...
144
Voted
CHIMIT
2007
ACM
15 years 9 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
FGCS
2007
90views more  FGCS 2007»
15 years 4 months ago
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Grid computing is a newly developed technology for complex systems with large-scale resource sharing and multi-institutional collaboration. The prominent feature of grid computing...
Xukai Zou, Yuan-Shun Dai, Xiang Ran
147
Voted
CIS
2005
Springer
15 years 10 months ago
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...
165
Voted
MOBISYS
2008
ACM
16 years 4 months ago
Micro power management of active 802.11 interfaces
Wireless interfaces are major power consumers on mobile systems. Considerable research has improved the energy efficiency of elongated idle periods or created more elongated idle ...
Jiayang Liu, Lin Zhong