Sciweavers

2454 search results - page 420 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CHI
2011
ACM
14 years 1 months ago
Dealing with death in design: developing systems for the bereaved
Increasingly, systems are being developed and used in ways that involve end of life issues such as death, dying, and bereavement. Yet design considerations and guidelines for tech...
Michael Massimi, Ronald M. Baecker

Publication
127views
13 years 9 months ago
Virtual Open Conversation Spaces: Towards Improved Awareness in a GSE Setting
Conversations between colleagues in collaborative software engineering are important for coordinating work, sharing knowledge and creating knowledge. Overhearing con- versations...
Virtual Open Conversation Spaces: Towards Improved...
ICEIS
2000
IEEE
15 years 2 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
IMC
2007
ACM
14 years 11 months ago
Compressed network monitoring for ip and all-optical networks
We address the problem of efficient end-to-end network monitoring of path metrics in communication networks. Our goal is to minimize the number of measurements or monitors requir...
Mark Coates, Yvan Pointurier, Michael Rabbat
ICISS
2009
Springer
14 years 7 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....