Sciweavers

3497 search results - page 633 / 700
» Mining in a mobile environment
Sort
View
PERVASIVE
2005
Springer
15 years 7 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
PERVASIVE
2005
Springer
15 years 7 months ago
Towards Massively Multi-user Augmented Reality on Handheld Devices
Augmented Reality (AR) can naturally complement mobile computing on wearable devices by providing an intuitive interface to a three-dimensional information space embedded within ph...
Daniel Wagner, Thomas Pintaric, Florian Ledermann,...
WEBDB
2005
Springer
132views Database» more  WEBDB 2005»
15 years 7 months ago
XFrag: A Query Processing Framework for Fragmented XML Data
Data fragmentation offers various attractive alternatives to organizing and managing data, and presents interesting characteristics that may be exploited for efficient processing...
Sujoe Bose, Leonidas Fegaras
XPU
2005
Springer
15 years 7 months ago
A Case Study on Naked Objects in Agile Software Development
Naked Objects and agile software development have been suggested to complement each other. Very few empirical studies to date exist where a product has been developed using the Nak...
Heikki Keränen, Pekka Abrahamsson
PEWASUN
2004
ACM
15 years 7 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...