Sciweavers

8080 search results - page 1361 / 1616
» From Computer Networks to Agent Networks
Sort
View
EUC
2008
Springer
15 years 6 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
PDPTA
2007
15 years 6 months ago
Mobile Services Based on Client-Server or P2P Architectures facing Issues of Context-Awareness and Heterogeneous
With the advent of mobile computing and mobile services becoming more widespread and more complex, the development process of those services requires an ever more important focus o...
Robert Schmohl, Uwe Baumgarten
ISICT
2003
15 years 6 months ago
Topic maps for context management
Abstract. The advent of context-aware computing requires a new paradigm in information management. Context information in a computing environment will take the form of disparate an...
Ruaidhri Power
BMVC
1997
15 years 6 months ago
Employing Region Features for Searching an Image Database
This paper describes recent work on the use of regional data extracted from segmented images for use as search keys in an image database query system. The motivation for this work...
Matthew E. J. Wood, Neill W. Campbell, Barry T. Th...
ECAI
2010
Springer
15 years 5 months ago
Mining Outliers with Adaptive Cutoff Update and Space Utilization (RACAS)
Recently the efficiency of an outlier detection algorithm ORCA was improved by RCS (Randomization with faster Cutoff update and Space utilization after pruning), which changes the ...
Chi-Cheong Szeto, Edward Hung
« Prev « First page 1361 / 1616 Last » Next »