Sciweavers

10044 search results - page 1873 / 2009
» Authentication in Wireless Networks
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Efficient Browsing of Web Search Results on Mobile Devices Based on Block Importance Model
It is expected that more and more people will search the web when they are on the move. Though conventional search engines can be directly visited from mobile devices with web bro...
Xing Xie, Gengxin Miao, Ruihua Song, Ji-Rong Wen, ...
PERCOM
2005
ACM
16 years 4 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
PERCOM
2005
ACM
16 years 4 months ago
Adaptive Temporal Radio Maps for Indoor Location Estimation
In this paper, we present a novel method to adapt the temporal radio maps for indoor location determination by offsetting the variational environmental factors using data mining t...
Jie Yin, Qiang Yang, Lionel M. Ni
PERCOM
2005
ACM
16 years 4 months ago
Hybrid Context Model Based on Multilevel Situation Theory and Ontology for Contact Centers
Context awareness and context modeling have raised their call for attention and importance quite recently in the world of contact centers for better customer services and relation...
Anupama Kalyan, Srividya Gopalan, V. Sridhar
122
Voted
PERCOM
2004
ACM
16 years 4 months ago
Pervasive Enablement of Business Processes
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Dipanjan Chakraborty, Hui Lei
« Prev « First page 1873 / 2009 Last » Next »