Sciweavers

IADIS
2004
14 years 28 days ago
Using Ontologies to Build Virtual Worlds for the Web
Today, the development of a VR application is still a long and difficult task. You need to be skilled in Virtual Reality (VR) technology to be able to develop a Virtual World. The...
Wesley Bille, Olga De Troyer, Frederic Kleinermann...
IADIS
2004
14 years 28 days ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
IADIS
2004
14 years 28 days ago
Computer-mediated communication: what can we learn from a diverse range of users?
The demographics of computer-mediated communication (CMC) users have changed considerably over the last twenty years. Whereas in the 1980's it was largely academics, and comp...
Sanjeet Bhachu, D. Ramanee Peiris, Annalu Waller
IADIS
2004
14 years 28 days ago
Computer-Mediated Communication: Can we Make it Better?
Computer-mediated communication (CMC) is fundamentally different to face-to-face (FTF) communication. The low bandwidth of CMC filters out important social and contextual cues, wh...
Sanjeet Bhachu, D. Ramanee Peiris, Annalu Waller
IADIS
2004
14 years 28 days ago
Designers' Perspective of Website Usability: The Cultural Dimension
The aim of this paper is to conduct a comparative study between liberal and prescriptive cultures (in this case Arab and British audiences) to extract the views of Web designers i...
Ali H. Al-Badi, Pam J. Mayhew
IADIS
2004
14 years 28 days ago
Towards Grid Enabled Information Retrieval
Our research aims to further our understanding of Information Retrieval for management of knowledge within the Grid environment. We do so by developing a search and categorisation...
Babak Akhgar, Nahum Korda, Jawed I. A. Siddiqi, Me...
IADIS
2004
14 years 28 days ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
IADIS
2004
14 years 28 days ago
Problem Based Learning in the Digital Age: A Case Study on Digital Entertainment
While the digital age is based on computing, computing disciplines remain conservative in their curricula and delivery methods. Computer science and information systems curricula ...
Janet Aisbett, Greg Gibbon
IADIS
2004
14 years 28 days ago
Using the concept of user policies for improving HTML documents accessibility
In this paper, we introduce the concept of "user policies" and its applications to the browsing of HTML documents. The objective of policies is to specify user preferenc...
Benoît Encelle, Nadine Baptiste-Jessel
IADIS
2004
14 years 28 days ago
Marketing capability and E-business performance: a case study of a retail bank
This paper addresses the significance of marketing capability for e-business performance in retail banking. A conceptual framework was built on the marketing and strategic managem...
Helena Ahola, Johanna Ahola