Sciweavers

418 search results - page 75 / 84
» Evaluating and implementing a collaborative office document ...
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 6 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
IEEESCC
2007
IEEE
14 years 3 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
SIGGRAPH
1993
ACM
14 years 23 days ago
Pad: an alternative approach to the computer interface
We believe that navigation in information spaces is best supported by tapping into our natural spatial and geographic ways of thinking. To this end, we are developing a new comput...
Ken Perlin, David Fox
HT
2005
ACM
14 years 2 months ago
From the writable web to global editability
The technical and competence requirements for writing content on the web is still one of the major factors that widens the gap between authors and readers. Although tools that sup...
Angelo Di Iorio, Fabio Vitali
ECTEL
2007
Springer
14 years 2 months ago
Creation of Lithuanian Digital Library of Educational Resources and Services: the Hypothesis, Contemporary Practice, and Future
Currently national digital library of educational resources and services (DLE) for primary and secondary education is under implementation in Lithuania. The article aims to analyse...
Eugenijus Kurilovas, Svetlana Kubilinskiene