Sciweavers

1466 search results - page 129 / 294
» Evaluation Issues in Autonomic Computing
Sort
View
PERCOM
2008
ACM
14 years 10 months ago
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and prob...
Dirk Henrici, Paul Müller
COLING
2010
14 years 5 months ago
Search with Synonyms: Problems and Solutions
Search with synonyms is a challenging problem for Web search, as it can easily cause intent drifting. In this paper, we propose a practical solution to this issue, based on co-cli...
Xing Wei, Fuchun Peng, Huihsin Tseng, Yumao Lu, Xu...
SOUPS
2009
ACM
15 years 4 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
15 years 4 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
ISMIR
2004
Springer
79views Music» more  ISMIR 2004»
15 years 3 months ago
Towards a Socio-cultural Compatibility of MIR Systems
Future MIR systems will be of great use and pleasure for potential users. If researchers have a clear picture about their “customers” in mind they can aim at building and eval...
Stephan Baumann, Tim Pohle, Shankar Vembu