Sciweavers

7422 search results - page 1388 / 1485
» Ethnomethodologically informed ethnography and information s...
Sort
View
CCS
2001
ACM
15 years 6 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
MSS
2000
IEEE
113views Hardware» more  MSS 2000»
15 years 6 months ago
Jiro Storage Management
The Jiro™ technology provides an environment intended for the implementation of storage management solutions. A product based on Jiro technology is an implementation based on th...
Bruce K. Haddon, William H. Connor
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 5 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
MM
1993
ACM
107views Multimedia» more  MM 1993»
15 years 5 months ago
What Video Can and Can't Do for Collaboration: A Case Study
As multimedia becomes an integral part of collaborative systems, we must understand how to design such systems to support users’ rich set of existing interaction skills, rather ...
Ellen Isaacs, John C. Tang
ICAIL
2007
ACM
15 years 5 months ago
The Legal-RDF Ontology. A Generic Model for Legal Documents
Legal-RDF.org1 publishes a practical ontology that models both the layout and content of a document and metadata about the document; these have been built using data models implici...
John McClure
« Prev « First page 1388 / 1485 Last » Next »