Sciweavers

2454 search results - page 275 / 491
» Privacy in the Information and Communications Technologies
Sort
View
126
Voted
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
15 years 7 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
SEAAI
1998
Springer
15 years 6 months ago
On theoretical backgrounds of CAD
Abstract. In the past, some information technologies (IT) have quickly been adopted by the engineering practice while the implementation of others has been slower. In the paper, th...
Ziga Turk
107
Voted
EUROSSC
2008
Springer
15 years 2 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
CLEIEJ
2010
14 years 11 months ago
Logic Programming: Can the learning and teaching process be improved apart from standards adopted by most professors and establi
Logic programming is one of the most important subjects for students pursuing a degree in Information Technology and Communication (ITC) at higher education institutions. Teaching ...
Ricardo Luiz B. L. Campos
108
Voted
CANDC
2007
ACM
15 years 5 months ago
Designing for collaborative creative problem solving
Collaborative creativity is traditionally supported by formal techniques, such as brainstorming. These techniques improve the idea-generation process by creating group synergies, ...
Otmar Hilliges, Lucia Terrenghi, Sebastian Boring,...