Sciweavers

1443 search results - page 139 / 289
» Aging Users are Still Users
Sort
View
104
Voted
ICSNC
2007
IEEE
15 years 7 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
101
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Border Games in Cellular Networks
— In each country today, cellular networks operate on carefully separated frequency bands. This careful separation is imposed by the regulators of the given country to avoid the ...
Márk Félegyházi, Mario Cagalj...
107
Voted
ITNG
2007
IEEE
15 years 7 months ago
Software Reuse: Research and Practice
— It has been almost four decades since the idea of software reuse was proposed. Many success stories have been told, yet it is believed that software reuse is still in the devel...
Sajjan G. Shiva, Lubna Abou Shala
BPM
2007
Springer
157views Business» more  BPM 2007»
15 years 7 months ago
Linking Domain Models and Process Models for Reference Model Configuration
Abstract. Reference process models capture common practices in a given domain and variations thereof. Such models are intended to be configured in a specific setting, leading to in...
Marcello La Rosa, Florian Gottschalk, Marlon Dumas...
WEBDB
2007
Springer
79views Database» more  WEBDB 2007»
15 years 7 months ago
Navigating Extracted Data with Schema Discovery
Open Information Extraction (OIE) is a recently-introduced type of information extraction that extracts small individual pieces of data from input text without any domainspecific...
Michael J. Cafarella, Dan Suciu, Oren Etzioni