Sciweavers

892 search results - page 51 / 179
» Management of Dynamic and Imperfect User Context Information
Sort
View
76
Voted
WWW
2008
ACM
16 years 15 days ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
ICC
2007
IEEE
15 years 6 months ago
Robust Multibeam Opportunistic Schemes Under Quality of Service Constraints
— Scheduling in a Broadcast (BC) channel based on partial Channel State Information at the Transmitter (CSIT) is carried out in an opportunistic way, where several orthogonal bea...
Nizar Zorba, Ana I. Pérez-Neira
AINA
2007
IEEE
15 years 6 months ago
A Modular Architecture for Context Sensing
— Due to the technological evolution, context-aware computing is slowly moving from dream to reality. These applications heavily rely in sensing the user’s environment and ing ...
Julián Grigera, Andres Fortier, Gustavo Ros...
ECSQARU
2005
Springer
15 years 5 months ago
Hydrologic Models for Emergency Decision Support Using Bayesian Networks
In the presence of a river flood, operators in charge of control must take decisions based on imperfect and incomplete sources of information (e.g., data provided by a limited numb...
Martín Molina, Raquel Fuentetaja, Luis Garr...
BPM
2006
Springer
135views Business» more  BPM 2006»
15 years 3 months ago
Improving Exception Handling by Discovering Change Dependencies in Adaptive Process Management Systems
Abstract. Process-aware information systems should enable the flexible alignment of business processes to new requirements by supporting deviations from the predefined process mode...
Barbara Weber, Werner Wild, Markus Lauer, Manfred ...