Sciweavers

1062 search results - page 168 / 213
» A Knowledge Management Approach to User Support
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
DIM
2008
ACM
15 years 5 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
121
Voted
ESWS
2008
Springer
15 years 5 months ago
Combining Fact and Document Retrieval with Spreading Activation for Semantic Desktop Search
Abstract. The Semantic Desktop is a means to support users in Personal Information Management (PIM). It provides an excellent test bed for Semantic Web technology: resources (e. g....
Kinga Schumacher, Michael Sintek, Leo Sauermann
CCO
2001
Springer
161views Combinatorics» more  CCO 2001»
15 years 8 months ago
Branch, Cut, and Price: Sequential and Parallel
Branch, cut, and price (BCP) is an LP-based branch and bound technique for solving large-scale discrete optimization problems (DOPs). In BCP, both cuts and variables can be generat...
Laszlo Ladányi, Ted K. Ralphs, Leslie E. Tr...
124
Voted
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 10 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay