Sciweavers

1018 search results - page 52 / 204
» Remote User Authentication Using Public Information
Sort
View
CHI
2009
ACM
14 years 8 months ago
Visualizing remote voice conversations
Online voice conversations are becoming ever more popular. People have been logging online text conversations, but what about voice conversations? Walter Ong simply states, "...
Pooja Mathur, Karrie Karahalios
MOBIHOC
2007
ACM
14 years 7 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning
ACMACE
2007
ACM
14 years 6 days ago
Remote augmented reality for multiple players over network
Augmented Reality (AR) in multimedia gaming is a dynamic and exciting field of research. One of the challenges is to have multiple users interacting in the networked augmented rea...
Daniel Chun-Ming Leung, Pak-Shing Au, Irwin King, ...
SIGUCCS
2003
ACM
14 years 1 months ago
Supporting a Windows XP/Red Hat Linux dual boot environment
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Bert Valenzuela
ICDIM
2007
IEEE
14 years 2 months ago
Remote instrument control with CIMA Web services and Web 2.0 technology
—The Common Instrument Middleware Architecture (CIMA) model for Web services based monitoring of remote scientific instruments is being extended and enhanced to provide a capabil...
Douglas du Boulay, Clinton Chee, Kenneth Chiu, Ric...