Sciweavers

1018 search results - page 37 / 204
» Remote User Authentication Using Public Information
Sort
View
GCC
2005
Springer
14 years 2 months ago
Supporting Remote Collaboration Through Structured Activity Logging
Abstract. This paper describes an integrated architecture for online collaborative multimedia (audio and text) meetings which supports the recording of participants' audio exc...
Matt-Mouley Bouamrane, Saturnino Luz, Masood Masoo...
UIST
2003
ACM
14 years 2 months ago
Classroom BRIDGE: using collaborative public and desktop timelines to support activity awareness
Classroom BRIDGE supports activity awareness by facilitating planning and goal revision in collaborative, project-based middle school science. It integrates largescreen and deskto...
Craig H. Ganoe, Jacob P. Somervell, Dennis C. Neal...
AINA
2007
IEEE
14 years 3 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
IADIS
2004
13 years 10 months ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
JCDL
2009
ACM
179views Education» more  JCDL 2009»
14 years 3 months ago
Disambiguating authors in academic publications using random forests
Users of digital libraries usually want to know the exact author or authors of an article. But different authors may share the same names, either as full names or as initials and...
Pucktada Treeratpituk, C. Lee Giles