Sciweavers

1432 search results - page 218 / 287
» A survey on context-aware systems
Sort
View
IJNSEC
2006
143views more  IJNSEC 2006»
14 years 12 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
TSMC
2008
110views more  TSMC 2008»
14 years 11 months ago
Navigation Technologies for Autonomous Underwater Vehicles
With recent advances in battery capacity and the development of hydrogen fuel cells, autonomous underwater vehicles (AUVs) are being used to undertake longer missions that were pre...
L. Stutters, Honghai Liu, C. Tiltman, David J. Bro...
PERVASIVE
2007
Springer
14 years 11 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...
ICDIM
2010
IEEE
14 years 9 months ago
Social network collaborative filtering framework and online trust factors: A case study on Facebook
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
Wei Chen, Simon Fong
IWC
2011
86views more  IWC 2011»
14 years 6 months ago
Selecting users for participation in IT projects: Trading a representative sample for advocates and champions?
The selection of users for participation in IT projects involves trade-offs between multiple criteria, one of which is selecting a representative cross-section of users. This crite...
Rasmus Rasmussen, Anders S. Christensen, Tobias Fj...