Sciweavers

342 search results - page 36 / 69
» Designing a Curious Negotiator
Sort
View
FECS
2006
101views Education» more  FECS 2006»
14 years 11 months ago
Providing Application Services for Small Businesses
- Many small businesses require distributed information systems but do not have the resources to develop, host or maintain them. An alternative approach may be to offer the softwar...
Carol Lushbough
CHI
2008
ACM
15 years 10 months ago
It's Mine, Don't Touch!: interactions at a large multi-touch display in a city centre
We present data from detailed observations of CityWall, a large multi-touch display installed in a central location in Helsinki, Finland. During eight days of installation, 1199 p...
Peter Peltonen, Esko Kurvinen, Antti Salovaara, Gi...
IEEEARES
2010
IEEE
15 years 4 months ago
Secure Monitoring of Service Level Agreements
—Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement1 is an SLA specification that addresses the need of both ...
K. P. Clark, Martijn Warnier, Frances M. T. Brazie...
MM
2006
ACM
140views Multimedia» more  MM 2006»
15 years 3 months ago
Instant archaeologies: digital lenses to probe and to perforate the urban fabric
The paper discusses the digital artwork series Impossible Geographies, works that weave dynamic cartographies of invisible, fragile and hybrid spaces. Impossible Geographies 01: M...
Petra Gemeinboeck, Atau Tanaka, Andy Dong
WPES
2004
ACM
15 years 3 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li