Sciweavers

90 search results - page 2 / 18
» It's Not What You Have, But How You Use It: Compromises in M...
Sort
View
ISN
1998
Springer
13 years 8 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
13 years 11 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim
JOT
2008
88views more  JOT 2008»
13 years 5 months ago
It depends on what you mean by 'working'
Often efforts to change techniques or processes are met by "But its working, why change now?" Usually the impetous for change comes from someone who does not believe it ...
John McGregor
DELFI
2006
13 years 6 months ago
Mobile Learning is Coming of Age - What we have and what we still miss
: Mobile learning has left the status of a new born child. It is time now to implement some structure into the complex and various activities by a framework presented in this paper...
Dirk Frohberg
IUI
2009
ACM
14 years 2 months ago
What were you thinking?: filling in missing dataflow through inference in learning from demonstration
Recent years have seen a resurgence of interest in programming by demonstration. As end users have become increasingly sophisticated, computer and artificial intelligence technolo...
Melinda T. Gervasio, Janet L. Murdock