Sciweavers

3564 search results - page 531 / 713
» Evaluating a Formal Modelling Language
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
15 years 11 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
TIME
2009
IEEE
15 years 5 months ago
Preserving Anonymity of Recurrent Location-Based Queries
—The anonymization of location based queries through the generalization of spatio-temporal information has been proposed as a privacy preserving technique. We show that the prese...
Daniele Riboni, Linda Pareschi, Claudio Bettini, S...
ADC
2009
Springer
141views Database» more  ADC 2009»
15 years 5 months ago
Event-based Communication for Location-based Service Collaboration
Location-based context-aware services for mobile users need to collaborate in disparate networks. Services come and go as the user moves and no central repository is available. Th...
Annika Hinze, Yann Michel, Lisa Eschner
AIED
2007
Springer
15 years 4 months ago
Who Says Three's a Crowd? Using a Cognitive Tutor to Support Peer Tutoring
Adding student collaboration to an intelligent tutoring system could leverage the benefits of both approaches. We have incorporated a mutual peer tutoring script, where students of...
Erin Walker, Bruce M. McLaren, Nikol Rummel, Kenne...
COMPSAC
2006
IEEE
15 years 4 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver