Sciweavers

1663 search results - page 139 / 333
» Computer Security in the Real World
Sort
View
133
Voted
COMPUTER
1999
95views more  COMPUTER 1999»
15 years 3 months ago
Wide-Area Computing: Resource Sharing on a Large Scale
abstract over a complex set of resources and provide a high-level way to share and manage them over the network. To be effective, such a system must address the challenges posed by...
Andrew S. Grimshaw, Adam Ferrari, Frederick Knabe,...
131
Voted
SIGCSE
2008
ACM
110views Education» more  SIGCSE 2008»
15 years 3 months ago
Innovating our self image
ion." These images do not foster collaboration with other fields and do not excite the curiosity of young people. In this session, Astrachan and Denning will discuss what they...
Owen L. Astrachan, Peter J. Denning
137
Voted
AIRWEB
2007
Springer
15 years 10 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
155
Voted
SIGGRAPH
1997
ACM
15 years 7 months ago
Moving objects in space: exploiting proprioception in virtual-environment interaction
Manipulation in immersive virtual environments is difficult partly because users must do without the haptic contact with real objects they rely on in the real world to orient them...
Mark R. Mine, Frederick P. Brooks Jr., Carlo H. S&...
150
Voted
JNW
2006
149views more  JNW 2006»
15 years 3 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo