Sciweavers

892 search results - page 59 / 179
» Management of Dynamic and Imperfect User Context Information
Sort
View
87
Voted
CCS
2009
ACM
16 years 14 days ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
SAC
2005
ACM
15 years 5 months ago
Intelligent file management in ubiquitous environments
The paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can succ...
Kartik Vishwanath, Arvind Gautam, Yugyung Lee
SOUPS
2010
ACM
15 years 3 months ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...
PVLDB
2010
184views more  PVLDB 2010»
14 years 10 months ago
TimeTrails: A System for Exploring Spatio-Temporal Information in Documents
Spatial and temporal data have become ubiquitous in many application domains such as the Geosciences or life sciences. Sophisticated database management systems are employed to ma...
Jannik Strötgen, Michael Gertz
IEEESCC
2006
IEEE
15 years 5 months ago
Using Assumptions in Service Composition Context
Service composition aims to provide an efficient and accurate model of a service, based on which the global service oriented architecture (SOA) can be realized, allowing value add...
Zheng Lu, Aditya Ghose, Peter Hyland, Ying Guan