Sciweavers

2454 search results - page 260 / 491
» Privacy in the Information and Communications Technologies
Sort
View
WWW
2005
ACM
16 years 2 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
WWW
2005
ACM
16 years 2 months ago
Adaptive filtering of advertisements on web pages
We present a browser extension to dynamically learn to filter unwanted images (such as advertisements or flashy graphics) based on minimal user feedback. To do so, we apply the we...
Babak Esfandiari, Richard Nock
74
Voted
WWW
2004
ACM
16 years 2 months ago
Associative sources and agents for zero-input publishing
This paper presents an associative agent that allows seamless navigation from one's own personal space to third-party associative sources, as well as the personal spaces of o...
David Wolber, Christopher H. Brooks
165
Voted
SAINT
2009
IEEE
15 years 8 months ago
CCDM: Central Controller-Based Device Management Architecture and Method to Split Management Scripts
This paper presents CCDM, a new architecture for management of devices, which collect environmental information and give effects to the environment. CCDM provides easy management ...
Akihiro Sugiyama, Hideya Ochiai, Hiroshi Esaki
ITNG
2008
IEEE
15 years 8 months ago
Overlapped Layers for Prolonging Network Lifetime in Multi-Hop Wireless Sensor Networks
In this paper, the bottleneck problem in PRMC-based wireless sensor networks is studied. This problem can be solved by overlapping neighboring layers. By this way, more cluster he...
Hongyan Wang, Mei Yang, Yingtao Jiang, Shupeng Wan...