Sciweavers

373 search results - page 64 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 28 days ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
ITCC
2003
IEEE
14 years 28 days ago
A Learning Objects Approach to Teaching Programming
The goal of this paper is to describe a new approach to a content creation and delivery mechanism for a programming course. This approach is based on the concept of creating a lar...
Victor Adamchik, Ananda Gunawardena
SIGCOMM
1991
ACM
13 years 11 months ago
IP-Based Protocols for Mobile Internetworking
We consider the problem of providing network access to hosts whose physical location changes with time. Such hosts cannot depend on traditional forms of network connectivity and r...
John Ioannidis, Dan Duchamp, Gerald Q. Maguire Jr.
CCS
2008
ACM
13 years 9 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
ACMDIS
2004
ACM
14 years 1 months ago
Context photography
Context photography consists of capturing context when taking a still picture, by sensing physical input in addition to light and representing it visually in real time. With this ...
Lalya Gaye, Lars Erik Holmquist, Maria Håkan...