Sciweavers

1990 search results - page 258 / 398
» Towards software-friendly networks
Sort
View
ICSNC
2007
IEEE
15 years 11 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 10 months ago
Interoperability in E-Government: More than Just Smart Middleware
According to Layne and Lee (2001), electronic Government (e-Government, e-Gov) progresses towards higher levels of integration and interoperability among and between government le...
Hans Jochen Scholl
WMTE
2005
IEEE
15 years 10 months ago
Supporting Pervasive Learning Environments: Adaptability and Context Awareness in Mobile Learning
In the mobile learning context, it is helpful to consider context awareness and adaptivity as two sides of the same coin. The purpose of the adaptivity and context awareness is to...
Antti Syvänen, Russell Beale, Mike Sharples, ...
128
Voted
IPPS
2000
IEEE
15 years 9 months ago
Deterministic Replay of Distributed Java Applications
Execution behavior of a Java application can be nondeterministic due to concurrent threads of execution, thread scheduling, and variable network delays. This nondeterminism in Jav...
Ravi B. Konuru, Harini Srinivasan, Jong-Deok Choi
141
Voted
DAC
2007
ACM
15 years 8 months ago
Synthetic biology: from bacteria to stem cells
Synthetic biology is revolutionizing how we conceptualize and approach the engineering of biological systems. Recent advances in the field are allowing us to expand beyond the con...
Ron Weiss