Sciweavers

1693 search results - page 306 / 339
» Interference-Resilient Information Exchange
Sort
View
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 2 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
HICSS
1999
IEEE
110views Biometrics» more  HICSS 1999»
15 years 2 months ago
Voting before Discussing: Computer Voting as Social Communication
This paper presents a case study on the use of an alternative method of computer support to that normally used, one that uses voting as a tool for social rather than rational choi...
Brian Whitworth, Robert J. McQueen
WWW
2007
ACM
15 years 10 months ago
Web4CE: accessing web-based applications on consumer devices
In a world where all devices will be interconnected, the boundaries between the different devices will start to disappear. Devices will be able to access each other's applica...
Walter Dees, Paul Shrubsole
KDD
2002
ACM
286views Data Mining» more  KDD 2002»
15 years 10 months ago
Object Boundary Detection For Ontology-Based Image Classification
Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential f...
Lei Wang, Latifur Khan, Casey Breen
ESOP
2009
Springer
15 years 4 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands