Sciweavers

1018 search results - page 80 / 204
» Remote User Authentication Using Public Information
Sort
View
IMSCCS
2006
IEEE
14 years 2 months ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
RIAO
2007
13 years 9 months ago
Using Prior Information Derived from Citations in Literature Search
Researchers spent a large amount of their time searching through an ever increasing number of scientific articles. Although users of scientific search engines prefer the ranking o...
Edgar Meij, Maarten de Rijke
HICSS
1999
IEEE
193views Biometrics» more  HICSS 1999»
14 years 12 days ago
Web-based Access to Distributed High-Performance Geographic Information Systems for Decision Support
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...
ESCIENCE
2005
IEEE
14 years 1 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
CHI
2005
ACM
14 years 8 months ago
The rotating compass: a novel interaction technique for mobile navigation
In current mobile navigation systems users receive the navigational instructions on a visual display or by descriptive audio. The mapping between the provided navigation informati...
Enrico Rukzio, Albrecht Schmidt, Antonio Krüg...