Sciweavers

2337 search results - page 410 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
14 years 1 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann
UIST
2004
ACM
14 years 1 months ago
A toolkit for managing user attention in peripheral displays
Traditionally, computer interfaces have been confined to conventional displays and focused activities. However, as displays become embedded throughout our environment and daily li...
Tara Matthews, Anind K. Dey, Jennifer Mankoff, Sco...
WWW
2006
ACM
14 years 8 months ago
Towards content trust of web resources
Trust is an integral part of the Semantic Web architecture. Most prior work on trust focuses on entity-centered issues such as authentication and reputation and does not take into...
Yolanda Gil, Donovan Artz
ESCIENCE
2006
IEEE
14 years 1 months ago
FAME: Adding Multi-Level Authentication to Shibboleth
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...
IROS
2006
IEEE
120views Robotics» more  IROS 2006»
14 years 1 months ago
Learning from Nature to Build Intelligent Autonomous Robots
Information processing within autonomous robots should follow a biomimetic approach. In contrast to traditional approaches that make intensive use of accurate measurements, numeric...
Rainer Bischoff 0002, Volker Graefe