Sciweavers

562 search results - page 98 / 113
» Open issues in organizing computer systems conferences
Sort
View
EDOC
2005
IEEE
15 years 5 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
VRML
2003
ACM
15 years 5 months ago
Implementation of a scripting language for VRML/X3D-based embodied agents
Embodied agents or humanoid avatars may effectively be used to communicate with human users. Currently there is a wide range of specification formalisms and scripting languages f...
Zhisheng Huang, Anton Eliëns, Cees T. Visser
CSCW
1996
ACM
15 years 3 months ago
Piazza: A Desktop Environment Supporting Impromptu and Planned Interactions
Much of the support for communication across distributed communities has focused on meetings and intentional contact. However, most interactions within co-located groups occur whe...
Ellen Isaacs, John C. Tang, Trevor Morris
TPDS
2008
106views more  TPDS 2008»
14 years 11 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
178
Voted
PVLDB
2010
135views more  PVLDB 2010»
14 years 10 months ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...