Sciweavers

1374 search results - page 152 / 275
» An information theoretic approach to processing management
Sort
View
EUROSSC
2009
Springer
15 years 1 months ago
Using Dempster-Shafer Theory of Evidence for Situation Inference
Abstract. In the domain of ubiquitous computing, the ability to identify the occurrence of situations is a core function of being ’contextaware’. Given the uncertain nature of ...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon A. Do...
DIM
2008
ACM
14 years 12 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
CSE
2009
IEEE
15 years 4 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
SIGCSE
2005
ACM
116views Education» more  SIGCSE 2005»
15 years 3 months ago
A company-based framework for a software engineering course
The subject matter of a typical undergraduate software engineering course, while providing necessary background, can be quite dry. Team-based programming projects often complement...
Thomas P. Way
JUCS
2010
154views more  JUCS 2010»
14 years 8 months ago
An Ambient Assisted Living Platform Integrating RFID Data-on-Tag Care Annotations and Twitter
: Although RFID is mainly used to identify objects whose data can then be accessed over the network, passive HF RFID tags do have significant data storage capacity (up to 4K), whic...
Diego López-de-Ipiña, Ignacio D&iacu...