Sciweavers

1147 search results - page 112 / 230
» Transformation of Access Rights
Sort
View
81
Voted
CCGRID
2001
IEEE
15 years 4 months ago
View-Based Consistency and Its Implementation
This paper proposes a novel View-based Consistency model for Distributed Shared Memory. A view is a set of ordinary data objects that a processor has the right to access in a data...
Zhiyi Huang, Stephen Cranefield, Martin K. Purvis,...
DRM
2008
Springer
15 years 2 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
111
Voted
IJCAI
2007
15 years 2 months ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White
126
Voted
CE
2007
100views more  CE 2007»
15 years 24 days ago
Visualization of participation: Does it contribute to successful computer-supported collaborative learning?
This study investigated the effects of visualization of participation during computer-supported collaborative learning (CSCL). It is hypothesized that visualization of participat...
Jeroen Janssen, Gijsbert Erkens, Gellof Kanselaar,...
CN
2007
106views more  CN 2007»
15 years 24 days ago
MIPv6 experimental evaluation using overlay networks
The commercial deployment of Mobile IPv6 has been hastened by the concepts of Integrated Wireless Networks and Overlay Networks, which are present in the notion of the forthcoming...
Pablo Vidales, Carlos Jesus Bernardos, Ignacio Sot...