Sciweavers

1988 search results - page 216 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
96
Voted
WSCG
2004
165views more  WSCG 2004»
15 years 4 months ago
Client-Server Infrastructure for Interactive 3D Multi-User Environments
Multi-user environments, using 3D graphics, more and more find their way into areas like e-business, entertainment and cooperative work. Due to the increasing capabilities of hard...
Ingo Soetebier, Horst Birthelmer, Jörg Sahm
120
Voted
SIGIR
2004
ACM
15 years 8 months ago
Knowing Where to Search: Personalized Search Strategies for Peers in P2P Networks
Optimizing and focusing search and results ranking in P2P networks becomes more and more important with the increasing size of these networks. Even though a few approaches have al...
Paul-Alexandru Chirita, Wolfgang Nejdl, Oana Scurt...
108
Voted
MOBIHOC
2003
ACM
16 years 2 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
CSCW
2002
ACM
15 years 2 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...
114
Voted
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 9 months ago
Responsiveness on the Interactive Grid
The Grid vision promises the secure and dynamic sharing of heterogeneous resources across the Internet. To date the emphasis has been on supercomputing scenarios where a relatively...
Colin Allison, Stuart D. J. Purdie, Alan Miller