Sciweavers

539 search results - page 47 / 108
» Pluggable personal data servers
Sort
View
SPC
2005
Springer
15 years 5 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
WMASH
2004
ACM
15 years 5 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
MOMM
2009
ACM
219views Communications» more  MOMM 2009»
15 years 4 months ago
Using mobiles for on campus location tracking
The wide spread of mobiles as handheld devices would naturally lead to various innovative applications that makes use of their ever increasing presence in our daily life. One such...
Fadi A. Aloul, Assim Sagahyroon, A. Al-Shami, I. A...
AAAI
2008
15 years 2 months ago
A User-Oriented Webpage Ranking Algorithm Based on User Attention Time
We propose a new webpage ranking algorithm which is personalized. Our idea is to rely on the attention time spent on a document by the user as the essential clue for producing the...
Songhua Xu, Yi Zhu, Hao Jiang, Francis C. M. Lau
CORR
2010
Springer
178views Education» more  CORR 2010»
14 years 12 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge