Sciweavers

1443 search results - page 126 / 289
» Aging Users are Still Users
Sort
View
96
Voted
ENTCS
2008
130views more  ENTCS 2008»
15 years 25 days ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
144
Voted
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 23 days ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
103
Voted
JUCS
2008
187views more  JUCS 2008»
15 years 22 days ago
Semantic Information in Medical Information Systems: Utilization of Text Mining Techniques to Analyze Medical Diagnoses
: Most information in Hospitals is still only available in text format and the amount of this data is immensely increasing. Consequently, text mining is an essential area of medica...
Andreas Holzinger, Regina Geierhofer, Felix Mö...
74
Voted
LIBT
2000
43views more  LIBT 2000»
15 years 16 days ago
Principles of Selection for Electronic Resources
THE AVAILABILITY IN ELECTRONIC FORMAT OF scholarly and scientific literatures and other forms of information relevant to the needs of library users has profoundly altered the chal...
Paul Metz
102
Voted
IJMHCI
2010
126views more  IJMHCI 2010»
14 years 10 months ago
Cocktail: Exploiting Bartenders' Gestures for Mobile Interaction
Recent mobile devices are capable of creating and storing a large amount of multimedia data, but sharing those data with others is still challenging. This paper presents Cocktail,...
Jong-Woon Yoo, Woomin Hwang, Hyunchul Seok, Sung K...