Sciweavers

211 search results - page 10 / 43
» Secrecy and Group Creation
Sort
View
CHI
2006
ACM
14 years 9 months ago
The ChiCI group
This paper describes the work, the vision, and the approach of the Child Computer Interaction (ChiCI) group at the University of Central Lancashire in the UK. This group, formed f...
Janet C. Read, Stuart MacFarlane, Rebecca Kelly, E...
CSFW
1992
IEEE
14 years 20 days ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
ARTMED
2002
76views more  ARTMED 2002»
13 years 8 months ago
Logistic-based patient grouping for multi-disciplinary treatment
Present-day healthcare witnesses a growing demand for coordination of patient care. Coordination is needed especially in those cases in which hospitals have structured healthcare ...
Laura Maruster, Ton Weijters, Geerhard de Vries, A...
CAISE
2008
Springer
13 years 10 months ago
COMA: A Tool for Collaborative Modeling
Building on earlier empirical work we have designed a prototype that supports modeling in groups. The COllaborative Modeling Architecture tool (COMA tool) coordinates UML modeling ...
Peter Rittgen
ISCC
2003
IEEE
130views Communications» more  ISCC 2003»
14 years 1 months ago
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation
Perfect Secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time a member joins or leaves the group. A Key Server must ...
Josep Pegueroles, Francisco Rico-Novella