Sciweavers

209 search results - page 28 / 42
» Establishing Persistent Identity using the Handle System
Sort
View
ICAIL
2007
ACM
13 years 11 months ago
Essential deduplication functions for transactional databases in law firms
As massive document repositories and knowledge management systems continue to expand, in proprietary environments as well as on the Web, the need for duplicate detection becomes i...
Jack G. Conrad, Edward L. Raymond
AVI
2004
13 years 9 months ago
Stitching: pen gestures that span multiple displays
Stitching is a new interaction technique that allows users to combine pen-operated mobile devices with wireless networking by using pen gestures that span multiple displays. To st...
Ken Hinckley, Gonzalo Ramos, François Guimb...
ICAISC
2004
Springer
14 years 1 months ago
Semi-mechanistic Models for State-Estimation - Soft Sensor for Polymer Melt Index Prediction
Nonlinear state estimation is a useful approach to the monitoring of industrial (polymerization) processes. This paper investigates how this approach can be followed to the develop...
Balazs Feil, János Abonyi, Peter Pach, Sand...
PODC
2011
ACM
12 years 10 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
PERCOM
2008
ACM
14 years 7 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart