Sciweavers

7596 search results - page 1377 / 1520
» Challenges in forensic computing
Sort
View
DCOSS
2009
Springer
15 years 1 months ago
Empirical Evaluation of Wireless Underground-to-Underground Communication in Wireless Underground Sensor Networks
Abstract. Many applications for irrigation management and environment monitoring exploit buried sensors wired-connected to the soil surface for information retrieval. Wireless Unde...
Agnelo R. Silva, Mehmet C. Vuran
259
Voted
EUROPKI
2009
Springer
15 years 1 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
HCI
2009
15 years 1 months ago
Context-Aware Cognitive Agent Architecture for Ambient User Interfaces
An ambient user interface is a set of hidden intelligent interfaces that recognize user's presence and provides services to immediate needs. There are several research activit...
Youngho Lee, Choonsung Shin, Woontack Woo
HCI
2009
15 years 1 months ago
User Interface Adaptation of Web-Based Services on the Semantic Web
Abstract. The Web is constantly evolving into an unprecedented and continuously growing source of knowledge, information and services, potentially accessed at by anyone anytime, an...
Nikolaos Partarakis, Constantina Doulgeraki, Aster...
ICSOC
2009
Springer
15 years 1 months ago
Future Research Topics in Enterprise Architecture Management - A Knowledge Management Perspective
Identifying, gathering, and maintaining information on the current, planned, and target states of the architecture of an enterprise is one major challenge of enterprise architectur...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
« Prev « First page 1377 / 1520 Last » Next »