Sciweavers

8655 search results - page 524 / 1731
» Challenges for Trusted Computing
Sort
View
125
Voted
KIVS
2005
Springer
15 years 10 months ago
Reconfigurable consumer direct logistics systems
Abstract: The goals of the interdisciplinary project HORN were as well to improve competitiveness of service providers that deliver grocery items as to develop new hardware and sof...
Sébastien Truchat, Alexander Pflaum
OTM
2005
Springer
15 years 10 months ago
Personalising Context-Aware Applications
The immaturity of the field of context-aware computing means that little is known about how to incorporate appropriate personalisation mechanisms into context-aware applications. ...
Karen Henricksen, Jadwiga Indulska
144
Voted
WSTST
2005
Springer
15 years 10 months ago
Massive Multi-Agent Simulation in 3D
: In this paper, we discuss our challenge on how to give the creatures and ability to follow spatial restriction while keeping the complexity low enough to still allow for real-tim...
Masaru Aoyagi, Akira Namatame
120
Voted
ACMSE
2004
ACM
15 years 10 months ago
Security for fixed sensor networks
Sensor networks consist of resource-constrained sensors operating in a variety of environments. Given the severe constraints on these sensors, it is a particularly challenging pro...
Ning Hu, Randy K. Smith, Phillip G. Bradford
156
Voted
ADS
2004
Springer
15 years 10 months ago
How to Evaluate Models of User Affect?
Modeling user affect is becoming increasingly important for intelligent interfaces and agents that aim to establish believable interactions with their users. However, evaluating th...
Cristina Conati