Sciweavers

1029 search results - page 187 / 206
» A security framework for personal networks
Sort
View
MOBICOM
2012
ACM
12 years 12 months ago
Temporal reachability graphs
While a natural fit for modeling and understanding mobile networks, time-varying graphs remain poorly understood. Indeed, many of the usual concepts of static graphs have no obvi...
John Whitbeck, Marcelo Dias de Amorim, Vania Conan...
CHI
2006
ACM
15 years 10 months ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 2 months ago
Toward an Understanding of Creative Solution Generation
Researchers have sought a better understanding of creativity for more than a century and the resulting investigations have shed a great deal of light on the subject of creativity....
Eric L. Santanen, Robert O. Briggs, Gert-Jan de Vr...
BDA
2001
14 years 11 months ago
Querying RDF Descriptions for Community Web Portals
Community Web Portals (e.g., digital libraries, vertical aggregators, infomediaries) have become quite popular nowadays in supporting specific communities of interest on corporate...
Gregory Karvounarakis, Vassilis Christophides, Dim...
PERCOM
2006
ACM
15 years 9 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...