Sciweavers

8760 search results - page 1619 / 1752
» Modeling users of intelligent systems
Sort
View
144
Voted
SP
2000
IEEE
15 years 9 months ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan
DIGITALCITIES
2000
Springer
15 years 9 months ago
Extending the Services and the Accessibility of Community Networks
Community networks are community-oriented information and communication systems that are generally patterned after the public library’s model of free, inclusive service and commi...
Antonietta Grasso, Dave Snowdon, Michael Koch
MM
1999
ACM
112views Multimedia» more  MM 1999»
15 years 8 months ago
Geometrically correct imagery for teleconferencing
Current camera-monitor teleconferencing applications produce unrealistic imagery and break any sense of presence for the participants. Other capture/display technologies can be us...
Ruigang Yang, Michael S. Brown, W. Brent Seales, H...
ESOP
1999
Springer
15 years 8 months ago
An Idealized MetaML: Simpler, and More Expressive
MetaML is a multi-stage functional programming language featuring three constructs that can be viewed as statically-typed refinements of the back-quote, comma, and eval of Scheme....
Eugenio Moggi, Walid Taha, Zine-El-Abidine Benaiss...
WETICE
1998
IEEE
15 years 8 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
« Prev « First page 1619 / 1752 Last » Next »