Sciweavers

2454 search results - page 459 / 491
» Privacy in the Information and Communications Technologies
Sort
View
INTERACT
2003
14 years 11 months ago
Creating New User Experiences to Enhance Collaboration
: When technologies are introduced into collaborative settings, people are often required to work together in new, unfamiliar ways. This can lead to problems of resistance, and eve...
John Halloran, Yvonne Rogers, Tom Rodden, Ian Tayl...
JCP
2008
120views more  JCP 2008»
14 years 9 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
JFR
2007
131views more  JFR 2007»
14 years 9 months ago
Adaptive teams of autonomous aerial and ground robots for situational awareness
In this paper, we report on the integration challenges of the various component technologies developed towards the establishment of a framework for deploying an adaptive system of...
M. Ani Hsieh, Anthony Cowley, James F. Keller, Lui...
COMCOM
2004
117views more  COMCOM 2004»
14 years 9 months ago
Dynamic bandwidth allocation in multi-class connection-oriented networks
Multi-class network is becoming a more attractive solution to provide Quality-of-Service guarantee, as more quality-demanding applications are emerging. This research considers ne...
Samer Taha, Mohsen Kavehrad
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...