Sciweavers

1242 search results - page 15 / 249
» Digital Objects as Passwords
Sort
View
83
Voted
WWW
2009
ACM
15 years 10 months ago
A method of analyzing credibility based on LOD control of digital maps
Digital maps are widely used and appear on all types of platforms for integrating content. Users can change display region and scale by panning, zooming in, and zooming out on a d...
Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya
112
Voted
IADIS
2004
14 years 11 months ago
Problem Based Learning in the Digital Age: A Case Study on Digital Entertainment
While the digital age is based on computing, computing disciplines remain conservative in their curricula and delivery methods. Computer science and information systems curricula ...
Janet Aisbett, Greg Gibbon
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 3 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
114
Voted
IPM
1998
176views more  IPM 1998»
14 years 9 months ago
Interfaces and Tools for the Library of Congress National Digital Library Program
This paper describes a collaborative effort to explore user needs in a digital library, develop interface prototypes for a digital library, and suggest and prototype tools for dig...
Gary Marchionini, Catherine Plaisant, Anita Komlod...
COBUILD
1999
Springer
15 years 1 months ago
Passage: Physical Transportation of Digital Information in Cooperative Buildings
The Passage mechanism introduced in this paper provides an easy and intuitive way to transport various types of digital objects by using also normal physical objects without any sp...
Shin'ichi Konomi, Christian Müller-Tomfelde, ...