Sciweavers

306 search results - page 38 / 62
» Do you Queue
Sort
View
115
Voted
CAISE
2003
Springer
15 years 7 months ago
PIX-Grid: A Platform for P2P Photo Exchange
The proliferation of digital camera devices (stand-alone or combined with cell phones), new protocols such as MMS and the desire of people to communicate and share their experience...
Karl Aberer, Philippe Cudré-Mauroux, Anwita...
SAC
2009
ACM
15 years 7 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
137
Voted
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 6 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
134
Voted
SIGUCCS
2000
ACM
15 years 6 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
111
Voted
ESWS
2008
Springer
15 years 4 months ago
Rabbit: Developing a Control Natural Language for Authoring Ontologies
: The mathematical nature of description logics has meant that domain experts find them hard to understand. This forms a significant impediment to the creation and adoption of onto...
Glen Hart, Martina Johnson, Catherine Dolbear