Sciweavers

2454 search results - page 170 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
PERCOM
2007
ACM
16 years 1 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
107
Voted
IDS
1994
128views Database» more  IDS 1994»
15 years 5 months ago
Virtual Environments for Data Sharing and Visualisation - Populated Information Terrains
The Concept of Populated Information Terrains (PITS) aims to extend database technology with key ideas from the new fields of Virtual Reality (VR) and Computer Supported Cooperativ...
Steve Benford, John A. Mariani
IV
2008
IEEE
145views Visualization» more  IV 2008»
15 years 8 months ago
Beyond the Tyranny of the Pixel: Exploring the Physicality of Information Visualization
This paper consists of a review of contemporary that map and materialize abstract data as physical artifacts. With computing technology and the access of information influencing e...
Andrew Vande Moere
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
15 years 8 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl