Sciweavers

1051 search results - page 40 / 211
» group 2009
Sort
View
RTA
2009
Springer
14 years 4 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh
GROUP
2009
ACM
14 years 4 months ago
The dissemination of knowledge management
Our study on a community of knowledge management (KM) practitioners in the aerospace industry reveals challenges in the dissemination of KM concepts and tools. In this paper, we i...
Hiroko Wilensky, David F. Redmiles, Norman Makoto ...
CHI
2009
ACM
14 years 10 months ago
A mischief of mice: examining children's performance in single display groupware systems with 1 to 32 mice
Mischief is a system for classroom interaction that allows multiple children to use individual mice and cursors to interact with a single large display [20]. While the system can ...
Neema Moraveji, Kori Inkpen, Ed Cutrell, Ravin Bal...
HVEI
2009
13 years 7 months ago
Haptics disambiguates vision in the perception of pictorial relief
In this study we demonstrate that touch decreases the ambiguity in a visual image. It has been previously found that visual perception of three-dimensional shape is subject to cer...
Maarten W. A. Wijntjes, R. Volcic, Sylvia C. Pont,...
CSE
2009
IEEE
14 years 4 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu