Sciweavers

3544 search results - page 457 / 709
» Information Security in Open Systems
Sort
View
IADIS
2008
15 years 1 months ago
Towards Simple Interaction In The Classroom: An Nfc Approach
In a given environment, distributing different devices with computing capabilities around us opens up new possibilities. It allows simple and easy interaction between user and com...
Salvador W. Nava, Gabriel Chavira, Ramón He...
DRM
2003
Springer
15 years 5 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
AVI
2010
14 years 9 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza
PDPTA
2004
15 years 1 months ago
An Integrated Global Service for File Transfer and Management in a Network (FTM)
The management and access of distributed informational resources has emerged as an important requirement for scientific simulations using high-performance computing facilities. Bot...
Jim Almond, Peggy Lindner
WCCE
2001
105views Education» more  WCCE 2001»
15 years 1 months ago
Designing an IT College
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...