Sciweavers

3737 search results - page 504 / 748
» Knowledge Management and Promises
Sort
View
ITICSE
2004
ACM
14 years 1 months ago
Use of large databases for group projects at the nexus of teaching and research
Final year, group (capstone) projects in computing disciplines are often expected to fill multiple roles: in addition to allowing students to learn important domain-specific knowl...
Richard C. Thomas, Rebecca Mancy
SAC
2004
ACM
14 years 1 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
SAC
2004
ACM
14 years 1 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
CDVE
2004
Springer
113views Visualization» more  CDVE 2004»
14 years 1 months ago
Fostering Creativity in Cooperative Design
Creativity has become a valuable asset, given the fast paced changes most companies must nowadays deal with. Companies now look for creative, highly adaptive individuals who can ex...
Adriana Santarosa Vivacqua, Jano Moreira de Souza
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...