Sciweavers

1018 search results - page 62 / 204
» Remote User Authentication Using Public Information
Sort
View
ICONFERENCE
2011
13 years 3 months ago
Loose strands: searching for evidence of public access ICT impact on development
Telecenters, libraries and internet cafés are often credited as being important venues for making information and communication technologies (ICTs) more widely available for peop...
Araba Sey, Michelle Fellows
ACMDIS
2004
ACM
14 years 1 months ago
Sharing multimedia content with interactive public displays: a case study
The Plasma Posters are large screen, digital, interactive posterboards designed for informal content sharing within teams, groups, organizations and communities. Leveraging the fa...
Elizabeth F. Churchill, Les Nelson, Laurent Denoue...
ICEIS
2003
IEEE
14 years 1 months ago
A Multi-Level Architecture for Distributed Object Bases
Abstract: The work described in this article arises from two needs. First, there is still a need for providing more sophisticated database systems than just relational ones. Second...
Markus Kirchberg, Klaus-Dieter Schewe, Alexei Tret...
BMCBI
2008
156views more  BMCBI 2008»
13 years 8 months ago
ArrayWiki: an enabling technology for sharing public microarray data repositories and meta-analyses
Background: A survey of microarray databases reveals that most of the repository contents and data models are heterogeneous (i.e., data obtained from different chip manufacturers)...
Todd H. Stokes, J. T. Torrance, Henry Li, May D. W...
ACSAC
2005
IEEE
14 years 1 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith