Sciweavers

2200 search results - page 300 / 440
» Hop Integrity in Computer Networks
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
Seamless Browsing of Visual Contents in Shared Learning Environments
This paper presents a new interaction technique for browsing large visual information bases in a collaborative environment. The ATELIER project deals with learning environments fo...
Marco Loregian, Kresimir Matkovic, Thomas Psik
113
Voted
PERCOM
2005
ACM
16 years 3 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns
121
Voted
PERCOM
2004
ACM
16 years 3 months ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels
131
Voted
ACISICIS
2009
IEEE
15 years 10 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
HAPTICS
2009
IEEE
15 years 10 months ago
Collaborative haptic environment assessment
Collaborative virtual environments (CVE) allow users from different geographical locations to execute a shared task by acting upon the same entities in the virtual world. Most of ...
Felix G. Hamza-Lup, Benjamin M. Lambeth, James LaP...