Sciweavers

24529 search results - page 140 / 4906
» Computing on Authenticated Data
Sort
View
93
Voted
WWW
2004
ACM
16 years 3 months ago
Online feedback by tests and reporting for elearning and certification programs
The evaluation of eLearning success is an indispensable business requirement of education programs: the easy registration of `visits' to eLearning websites is, however, not s...
Dirk Bade, Georg Nüssel, Gerd Wilts
128
Voted
PERCOM
2003
ACM
16 years 2 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
209
Voted
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
16 years 4 months ago
Spatial Outsourcing for Location-based Services
- The embedding of positioning capabilities in mobile devices and the emergence of location-based applications have created novel opportunities for utilizing several types of multi...
Yin Yang, Stavros Papadopoulos, Dimitris Papadias,...
128
Voted
JAMIA
2010
131views more  JAMIA 2010»
14 years 9 months ago
The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data
Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information...
Christopher G. Chute, Scott A. Beck, Thomas B. Fis...
133
Voted
CLUSTER
2002
IEEE
15 years 2 months ago
Security Implications of Typical Grid Computing Usage Scenarios
A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to these...
Marty Humphrey, Mary R. Thompson