Sciweavers

260 search results - page 33 / 52
» Showing Users the Way: Signs in Virtual Worlds
Sort
View
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 3 months ago
SOTIP as a Model for Outsourcing of Telecom Services for the Public Sector
The political intentions for the past 20 years have broadly speaking been to reduce the number of publicly owned and publicly run activities. Outsourcing is an often applied way t...
Helena Lindskog
NDSS
2003
IEEE
15 years 2 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
CLUSTER
2004
IEEE
14 years 9 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...
HPDC
2007
IEEE
15 years 3 months ago
An architecture for virtual organization (VO)-based effective peering of content delivery networks
The proprietary nature of existing Content Delivery Networks (CDNs) means they are closed and do not naturally cooperate, resulting in “islands” of CDNs. Finding ways for dist...
Al-Mukaddim Khan Pathan, James Broberg, Kris Buben...
CAISE
2004
Springer
15 years 2 months ago
Office Activity Procedure Exception Handling Realization Difficulties
Office activity procedure automation is getting very popular in major organizations. During the automation then workflow method is chosen frequently, because of its possibility to ...
Dovile Vojevodina, Genadijus Kulvietis