Sciweavers

448 search results - page 48 / 90
» Who is in Control
Sort
View
AMI
2009
Springer
15 years 10 months ago
I Bet You Look Good on the Wall: Making the Invisible Computer Visible
The design ideal of the invisible computer, prevalent in the vision of ambient intelligence (AmI), has led to a number of interaction challenges. The complex nature of AmI environm...
Jo Vermeulen, Jonathan Slenders, Kris Luyten, Kari...
147
Voted
BMCBI
2006
126views more  BMCBI 2006»
15 years 3 months ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...
172
Voted
ACSC
2007
IEEE
15 years 10 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
ACSW
2006
15 years 5 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
ESE
2006
105views Database» more  ESE 2006»
15 years 3 months ago
Replaying development history to assess the effectiveness of change propagation tools
As developers modify software entities such as functions or variables to introduce new features, enhance old ones, or fix bugs, they must ensure that other entities in the software...
Ahmed E. Hassan, Richard C. Holt