Sciweavers

145 search results - page 26 / 29
» Private Data Management in Collaborative Environments
Sort
View
ICS
2003
Tsinghua U.
14 years 21 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
VRST
2003
ACM
14 years 22 days ago
Tele-sports and tele-dance: full-body network interaction
Researchers have had great success using motion capture tools for controlling avatars in virtual worlds. Another current of virtual reality research has focused on building collab...
Benjamin Schaeffer, Mark Flider, Hank Kaczmarski, ...
ECTEL
2007
Springer
14 years 1 months ago
An Interoperability Infrastructure for Distributed Feed Networks
Blogs have the aordance to become an integral part of teaching and learning processes as a vehicle for knowledge management. Open, exible systems integrating blogs provide user-f...
Fridolin Wild, Steinn E. Sigurðarson, Stefan S...
ICDCS
1999
IEEE
13 years 11 months ago
Stateful Group Communication Services
group multicasts provide a nice abstraction for communicating data reliably among group members and have been used for a variety of applications. In this paper we present Corona, ...
Radu Litiu, Atul Prakash
WIKIS
2006
ACM
14 years 1 months ago
OntoWiki: community-driven ontology engineering and ontology usage based on Wikis
Ontologies are consensual representations of a domain of discourse and the backbone of the future Semantic Web. Currently, however, only a fraction of Web users can take part in t...
Martin Hepp, Daniel Bachlechner, Katharina Siorpae...