Sciweavers

592 search results - page 86 / 119
» Competition, Cooperation, and Authorization
Sort
View
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
INFOCOM
2006
IEEE
14 years 1 months ago
Stimulating Participation in Wireless Community Networks
—Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users ...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
ACMDIS
2006
ACM
14 years 1 months ago
A persistent chat space for work groups: the design, evaluation and deployment of loops
Loops is a text-based computer mediated communication system aimed at small- to medium-sized corporate work groups. We begin by discussing the goals of the system and the rational...
Thomas Erickson, Wendy A. Kellogg, Mark Laff, Jere...
NORDICHI
2006
ACM
14 years 1 months ago
Real life experiences with experience design
Experience Design is an emergent field of study, and various approaches to the field abound. In this paper, we take a pragmatic approach to identifying key aspects of an experienc...
Peter Dalsgård, Kim Halskov
OZCHI
2006
ACM
14 years 1 months ago
Interpersonal awareness in the domestic realm
Family and friends naturally maintain an awareness of each other on an ongoing basis (e.g., knowing one’s schedule, health issues) and many technologies are now being contemplat...
Carman Neustaedter, Kathryn Elliot, Saul Greenberg