Sciweavers

905 search results - page 147 / 181
» Context aware sensornet
Sort
View
ITICSE
2006
ACM
15 years 5 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci
MSWIM
2006
ACM
15 years 5 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
WECWIS
2005
IEEE
145views ECommerce» more  WECWIS 2005»
15 years 5 months ago
Ambient e-Service Embracing Model
The notion of ambient e-services is defined in this paper to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based...
Yuanchu Hwang, Soe-Tsyr Yuan
JCDL
2005
ACM
136views Education» more  JCDL 2005»
15 years 5 months ago
Digital libraries' support for the user's 'information journey'
The temporal elements of users’ information requirements are a continually confounding aspect of digital library design. No sooner have users’ needs been identified and suppor...
Anne Adams, Ann Blandford
MDM
2005
Springer
170views Communications» more  MDM 2005»
15 years 5 months ago
The role of caching and context-awareness in P2P service discovery
Mobile terminals (cellular phones, PDAs, palmtops etc.) emerge as a new class of small-scale, ad-hoc service providers that share data and functionality via mobile web services’...
Christos Doulkeridis, Vassilis Zafeiris, Michalis ...