Sciweavers

1530 search results - page 189 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
137
Voted
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 9 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
116
Voted
WWW
2003
ACM
16 years 4 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
124
Voted
MOBISYS
2007
ACM
16 years 3 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
137
Voted
COOPIS
1998
IEEE
15 years 7 months ago
A Generative Communication Service for Database Interoperability
Parallel and distributed programming is conceptually harder to undertake and to understand than sequential programming, because a programmer often has to manage the coexistence an...
Wilhelm Hasselbring, Mark Roantree
128
Voted
JNCA
2007
80views more  JNCA 2007»
15 years 3 months ago
High-speed routers design using data stream distributor unit
As the line rates standards are changing frequently to provide higher bit rates, the routers design has become very challenging due to the need for new wire-speed router’s netwo...
Ali El Kateeb