Sciweavers

213 search results - page 39 / 43
» Issues with RFID Usage in Ubiquitous Computing Applications
Sort
View
MIDDLEWARE
2007
Springer
15 years 3 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
100
Voted
IJMSO
2007
201views more  IJMSO 2007»
14 years 9 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
ITICSE
2009
ACM
15 years 3 months ago
Hybrid and custom data structures: evolution of the data structures course
The topic of data structures has historically been taught with two major focuses: first, the basic definition and implementation of a small set of basic data structures (e.g. list...
Daniel J. Ernst, Daniel E. Stevenson, Paul J. Wagn...
FIW
2007
152views Communications» more  FIW 2007»
14 years 11 months ago
Considering Safety and Feature Interactions for Integrated Services of Home Network System
Assuring safety in the home network system (HNS) is a crucial issue to guarantee high quality of life. In this position paper, we first review our previous work, formulating three...
Ben Yan
MC
2003
157views Computer Science» more  MC 2003»
14 years 10 months ago
From Adaptive Hypermedia to the Adaptive Web
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Peter Brusilovsky