Sciweavers

885 search results - page 153 / 177
» Distributed User Experience in Persuasive Technology Environ...
Sort
View
DIM
2005
ACM
15 years 1 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
JTAER
2010
163views more  JTAER 2010»
14 years 6 months ago
A semantic query approach to personalized e-Catalogs service system
With the emergence of the e-Catalog, there has been an increasingly wide application of commodities query in distributed environment in the field of e-commerce. But e-Catalog is o...
Donglin Chen, Xiaofei Li, Yueling Liang, Jun Zhang
EUPROJECTS
2006
Springer
15 years 3 months ago
Human Computer Confluence
Pervasive Computing has postulated to invisibly integrate technology into everyday objects in such a way, that these objects turn into smart things. Not only a single object of thi...
Alois Ferscha, Stefan Resmerita, Clemens Holzmann
CLEF
2010
Springer
14 years 8 months ago
Examining the Robustness of Evaluation Metrics for Patent Retrieval with Incomplete Relevance Judgements
Recent years have seen a growing interest in research into patent retrieval. One of the key issues in conducting information retrieval (IR) research is meaningful evaluation of the...
Walid Magdy, Gareth J. F. Jones
WWW
2008
ACM
16 years 13 days ago
Lock-free consistency control for web 2.0 applications
Online collaboration and sharing is the central theme of many webbased services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2...
Jiangming Yang, Haixun Wang, Ning Gu, Yiming Liu, ...