Sciweavers

2560 search results - page 467 / 512
» Securing VO Management
Sort
View
SIGCSE
2008
ACM
128views Education» more  SIGCSE 2008»
13 years 9 months ago
Cybercivics: a novel approach to reaching k-12 students with the social relevance of computer science
This paper describes CyberCivics, a novel approach to computer science outreach that integrates hands-on computing experiences with the study of contemporary social and political ...
Jim Owens, Jeanna Matthews
JCIT
2007
159views more  JCIT 2007»
13 years 9 months ago
GDIA: A Scalable Grid Infrastructure for Data Intensive Applications
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
JCM
2007
143views more  JCM 2007»
13 years 9 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
VLC
2008
146views more  VLC 2008»
13 years 9 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
DEBU
2000
90views more  DEBU 2000»
13 years 9 months ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner