Sciweavers

1927 search results - page 287 / 386
» An Access Control Model for Location based Services
Sort
View
UMUAI
2010
107views more  UMUAI 2010»
14 years 12 months ago
PERSONAF: framework for personalised ontological reasoning in pervasive computing
Abstract. Pervasive computing creates possibilities for presenting highly personalised information about the people, places and things in a building. One of the challenges for such...
William T. Niu, Judy Kay
GLOBECOM
2009
IEEE
15 years 5 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
EKAW
2000
Springer
15 years 5 months ago
What's in an Electronic Business Model?
An electronic business model is an important baseline for the development of e-commerce system applications. Essentially, it provides the design rationale for e-commerce systems fr...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 8 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...
BPM
2008
Springer
207views Business» more  BPM 2008»
15 years 3 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...