Sciweavers

2454 search results - page 243 / 491
» Privacy in the Information and Communications Technologies
Sort
View
121
Voted
OTM
2005
Springer
15 years 7 months ago
Middleware for Distributed Context-Aware Systems
Abstract. Context-aware systems represent extremely complex and heterogeneous distributed systems, composed of sensors, actuators, application components, and a variety of context ...
Karen Henricksen, Jadwiga Indulska, Ted McFadden, ...
PERSUASIVE
2010
Springer
15 years 6 months ago
Happier Together: Integrating a Wellness Application into a Social Network Site
What are the benefits and drawbacks of integrating health and wellness interventions into existing online social network websites? In this paper, we report on a case study of deplo...
Sean A. Munson, Debra Lauterbach, Mark W. Newman, ...
ACSW
2003
15 years 3 months ago
A Survey of Research on Context-Aware Homes
The seamless integration of people, devices and computation will soon become part of our daily life. Sensors, actuators, wireless networks and ubiquitous devices powered by intelli...
Sven Meyer, Andry Rakotonirainy
OTM
2010
Springer
15 years 8 days ago
A Process View Framework for Artifact-Centric Business Processes
Over the past several years, the artifact-centric approach to workflow has emerged as a new paradigm of business process modelling. It provides a robust structure of workflow and s...
Sira Yongchareon, Chengfei Liu
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 8 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic