Sciweavers

6137 search results - page 168 / 1228
» Securing Collaborative Applications
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 9 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
COMPUTER
2002
196views more  COMPUTER 2002»
13 years 10 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...
SMC
2007
IEEE
146views Control Systems» more  SMC 2007»
14 years 4 months ago
Blender plugin implementations for 3D collaborative work
— The development of networking and client/server systems over the Internet had led to many collaborative work software applications. To extend the graphic design collaborative p...
Martin Lesage, Omar Cherkaoui, Faysal Abouzaid, Ma...
CSCW
2004
ACM
14 years 3 months ago
Towards dynamic collaboration architectures
In this paper, we introduce the concept of dynamically changing between centralized, replicated, and hybrid collaboration architectures. It is implemented by providing users a fun...
Goopeel Chung, Prasun Dewan
JUCS
2008
148views more  JUCS 2008»
13 years 10 months ago
Integrating Service-Oriented Mobile Units to Support Collaboration in Ad-hoc Scenarios
: Advances in wireless communication and mobile computing extend collaboration scenarios. Mobile workers using computing devices are currently able to collaborate in order to carry...
H. Andrés Neyem, Sergio F. Ochoa, Jos&eacut...