Sciweavers

1663 search results - page 309 / 333
» Privacy and Identity Management
Sort
View
CSCW
2006
ACM
15 years 5 months ago
Moving office: inhabiting a dynamic building
Mixed Reality Architecture (MRA) supports distributed teams in their everyday work activities by linking multiple physical spaces across a shared three-dimensional virtual world. ...
Holger Schnädelbach, Alan Penn, Phil Steadman...
IWRIDL
2006
ACM
158views Education» more  IWRIDL 2006»
15 years 5 months ago
Document image analysis for digital libraries
Digital Libraries have many forms – institutional libraries for information dissemination, document repositories for recordkeeping, and personal digital libraries for organizing...
Prateek Sarkar
SOUPS
2006
ACM
15 years 5 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
STORAGESS
2005
ACM
15 years 5 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
ATAL
2005
Springer
15 years 5 months ago
Bumping strategies for the multiagent agreement problem
We introduce the Multiagent Agreement Problem (MAP) to represent a class of multiagent scheduling problems. MAP is based on the Distributed Constraint Reasoning (DCR) paradigm and...
Pragnesh Jay Modi, Manuela M. Veloso