Sciweavers

6667 search results - page 1302 / 1334
» Applications At Your Service
Sort
View
ACSAC
2001
IEEE
15 years 3 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
ICSE
2000
IEEE-ACM
15 years 3 months ago
Software needs engineering: a position paper
When the general press refers to `software' in its headlines, then this is often not to relate a success story, but to expand on yet another `software-risk-turned-problem-sto...
Jane Grimson, Hans-Jürgen Kugler
HICSS
1995
IEEE
90views Biometrics» more  HICSS 1995»
15 years 3 months ago
Connection management without retaining information
Managing a connection between two hosts in a network is an important service to provide in order to make the network useful for many applications. The two main subproblems are the...
Hagit Attiya, Shlomi Dolev, Jennifer L. Welch
EDBT
2009
ACM
207views Database» more  EDBT 2009»
15 years 3 months ago
Evaluating probability threshold k-nearest-neighbor queries over uncertain data
In emerging applications such as location-based services, sensor monitoring and biological management systems, the values of the database items are naturally imprecise. For these ...
Reynold Cheng, Lei Chen 0002, Jinchuan Chen, Xike ...
MOBISYS
2010
ACM
15 years 2 months ago
Growing an organic indoor location system
Most current methods for 802.11-based indoor localization depend on surveys conducted by experts or skilled technicians. Some recent systems have incorporated surveying by users. ...
Jun-geun Park, Ben Charrow, Dorothy Curtis, Jonath...
« Prev « First page 1302 / 1334 Last » Next »