Sciweavers

2061 search results - page 302 / 413
» Authorization for Metacomputing Applications
Sort
View
CG
2007
Springer
15 years 4 months ago
Visualizing and animating the winged-edge data structure
The winged- and half- edge data structures are commonly used representations for polyhedron models. Due to the complexity, students in an introductory to computer graphics course ...
Bryan Neperud, John L. Lowther, Ching-Kuang Shene
ISI
2008
Springer
15 years 4 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
JSW
2008
240views more  JSW 2008»
15 years 4 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
JUCS
2008
166views more  JUCS 2008»
15 years 4 months ago
Learning Design in Adaptive Educational Hypermedia Systems
: After more than ten years of research aiming at defining methods and techniques to deliver personalized instruction, Adaptive Educational Hypermedia Systems have not made the jum...
Adriana J. Berlanga, Francisco José Garc&ia...
JWSR
2008
147views more  JWSR 2008»
15 years 4 months ago
Karma2: Provenance Management for Data-Driven Workflows
: The increasing ability for the sciences to sense the world around us is resulting in a growing need for data driven applications that are under the control of workflows composed ...
Yogesh L. Simmhan, Beth Plale, Dennis Gannon