Sciweavers

7416 search results - page 1272 / 1484
» Design of an Anatomy Information System
Sort
View
GROUP
2003
ACM
14 years 1 months ago
Technology for boundaries
This paper presents a study of an organisation, which is undergoing a process transforming organisational and technological boundaries. In particular, we shall look at three kinds...
Susanne Bødker, Jannie Friis Kristensen, Ch...
HT
2003
ACM
14 years 1 months ago
Simplifying annotation support for real-world-settings: a comparative study of active reading
Despite the multitude of existing interfaces for annotation, little is known about their influence on the created annotations. In this paper, first findings of a comparative video...
Hartmut Obendorf
SIGCSE
2010
ACM
175views Education» more  SIGCSE 2010»
14 years 1 months ago
MPCT: media propelled computational thinking
Media-Propelled Computational Thinking (MPCT – pronounced impact) is a course designed to introduce programming in the context of engaging problems in media computation, math, a...
Eric Andrew Freudenthal, Mary K. Roy, Alexandria N...
CCS
2001
ACM
14 years 22 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 10 days ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
« Prev « First page 1272 / 1484 Last » Next »