Sciweavers

40 search results - page 5 / 8
» Proxy-Based Authorization and Accounting for Distributed Sys...
Sort
View
CHI
2005
ACM
15 years 10 months ago
Distributed display environments
Augmented reality makes it possible to visualize information directly within the context of the real world by overlaying virtual graphics. We use the term view management to refer...
Dugald Ralph Hutchings, John T. Stasko, Mary Czerw...
C5
2004
IEEE
15 years 1 months ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 4 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
95
Voted
EDBT
2011
ACM
199views Database» more  EDBT 2011»
14 years 1 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
Reducing Trust in the PKG in Identity Based Cryptosystems
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Vipul Goyal