Sciweavers

347 search results - page 17 / 70
» On private computation in incomplete networks
Sort
View
UM
2001
Springer
14 years 2 days ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
COR
2008
175views more  COR 2008»
13 years 7 months ago
Lower and upper bounds for a two-level hierarchical location problem in computer networks
In this paper a two-level hierarchical model for the location of concentrators and routers in computers networks is presented. Given a set of candidate locations and the capacitie...
Aníbal Alberto Vilcapoma Ignacio, Virg&iacu...
DFMA
2005
IEEE
100views Multimedia» more  DFMA 2005»
14 years 1 months ago
Mobile Computing to Facilitate Interaction in Lectures and Meetings
The Campus Mobile project explored how PDAs and innovative interfaces can improve interaction during lectures and in small meetings. These mobile computers (small PCs or PDAs) are...
Isabelle M. Demeure, Claudie Faure, Eric Lecolinet...
ECUMN
2007
Springer
14 years 1 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
COCOON
2005
Springer
14 years 1 months ago
Radio Networks with Reliable Communication
Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the...
Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, H...