Sciweavers

5799 search results - page 975 / 1160
» Patterns Generate Architectures
Sort
View
144
Voted
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
15 years 10 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam
146
Voted
BTW
2007
Springer
185views Database» more  BTW 2007»
15 years 10 months ago
Data Staging for OLAP- and OLTP-Applications on RFID Data
: The emerging trend towards seamless monitoring of all business processes via comprehensive sensor networks – in particular RFID readers – creates new data management challeng...
Stefan Krompass, Stefan Aulbach, Alfons Kemper
154
Voted
CAISE
2007
Springer
15 years 10 months ago
Publishing and Discovering Information and Services for Tagged Products
Radio frequency identification (RFID), and more recently the development of Near Field Communication (NFC) technology, have popularized the idea of linking real-world products wit...
Christof Roduner, Marc Langheinrich
122
Voted
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 10 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
125
Voted
DCOSS
2007
Springer
15 years 10 months ago
Localization for Anchoritic Sensor Networks
We introduce a class of anchoritic sensor networks, where communications between sensor nodes are undesirable or infeasible due to, e.g., harsh environments, energy constraints, or...
Yuliy M. Baryshnikov, Jian Tan