Sciweavers

1018 search results - page 122 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2005
ACM
14 years 8 months ago
eyeView: focus+context views for large group video conferences
In this paper, we describe the design of eyeView, a video conferencing system that uses participant looking behavior to determine the size of online video conferencing windows. Th...
Tracy Jenkin, Jesse McGeachie, David Fono, Roel Ve...
HT
1998
ACM
14 years 6 days ago
Link services or link agents?
A general link service for the WWW has been used within an Electronic Libraries’ project. Experience using it shows that as the links become increasingly interesting to the user...
Les Carr, Wendy Hall, Steve Hitchcock
EAGC
2004
Springer
14 years 1 months ago
Monitoring Message-Passing Parallel Applications in the Grid with GRM and Mercury Monitor
Application monitoring in the grid for parallel applications is hardly supported in recent grid infrastructures. There is a need to visualize the behavior of the program during its...
Norbert Podhorszki, Zoltán Balaton, Gabor G...
GRID
2007
Springer
13 years 8 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
DIM
2009
ACM
14 years 2 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin