Sciweavers

2927 search results - page 63 / 586
» Secure Distributed Human Computation
Sort
View
HT
2005
ACM
14 years 2 months ago
Distributed, real-time computation of community preferences
We describe the integration of smart digital objects with Hebbian learning to create a distributed, real-time, scalable approach to adapting to a community's preferences. We ...
Thomas Lutkenhouse, Michael L. Nelson, Johan Bolle...
FTDCS
1997
IEEE
14 years 1 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu
CHI
2007
ACM
14 years 9 months ago
Distributed tabletops: territoriality and orientation in distributed collaboration
Previous research has shown that orientation and territory serve key roles during tabletop collaboration. However, no one has yet investigated whether they can play similar roles ...
Philip Tuddenham
ISW
2007
Springer
14 years 3 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...
JERIC
2006
68views more  JERIC 2006»
13 years 9 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop