Sciweavers

557 search results - page 39 / 112
» Two experiences designing for effective security
Sort
View
ECTEL
2008
Springer
13 years 10 months ago
Supporting Reflection in Informal Learning
: This paper analyzes how different visualisations of interaction information can be used to indicate user activity and support informal learning. The question for research is how ...
Christian Glahn
AMC
2005
172views more  AMC 2005»
13 years 8 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh
MSS
1999
IEEE
140views Hardware» more  MSS 1999»
14 years 29 days ago
Pursuit of a Scalable High Performance Multi-Petabyte Database
When the BaBar experiment at the Stanford Linear Accelerator Center starts in April 1999, it will generate approximately 200TB/year of data at a rate of 10MB/sec for 10 years. A m...
Andrew Hanushevsky, Marcia Nowark
IWCMC
2006
ACM
14 years 2 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
CSCW
2002
ACM
13 years 8 months ago
Making web sites be places for social interaction
Technology can play an important role in enabling people to interact with each other. The Web is one such technology with the affordances for sharing information and for connectin...
Andreas Girgensohn, Alison Lee