Sciweavers

1062 search results - page 175 / 213
» A Knowledge Management Approach to User Support
Sort
View
SRDS
2010
IEEE
14 years 12 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
ISSADS
2004
Springer
15 years 7 months ago
Evaluating Location Dependent Queries Using ISLANDS
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
Marie Thilliez, Thierry Delot
CHI
2004
ACM
16 years 2 months ago
A social proxy for distributed tasks: design and evaluation of a working prototype
This paper describes an approach to managing tasks and processes that are distributed across a large number of people. The basic idea is to use a social visualization called a tas...
Thomas Erickson, Wei Huang, Catalina Danis, Wendy ...
IWCMC
2009
ACM
15 years 8 months ago
I-PMIP: an inter-domain mobility extension for proxy-mobile IP
Proxy Mobile IP (PMIP) provides a solution for networkbased localized mobility management which in contrast to host-based mobility solutions, like Mobile IP (MIP), does not requir...
Niklas Neumann, Jun Lei, Xiaoming Fu, Gong Zhang
CORR
2010
Springer
158views Education» more  CORR 2010»
15 years 2 months ago
Active Architecture for Pervasive Contextual Services
Pervasive services may be defined as services that are available to any client (anytime, anywhere). Here we focus on the software and network infrastructure required to support pe...
Graham N. C. Kirby, Alan Dearle, Ronald Morrison, ...