Sciweavers

2454 search results - page 315 / 491
» Privacy in the Information and Communications Technologies
Sort
View
117
Voted
HT
1998
ACM
15 years 6 months ago
XHMBS: A Formal Model to Support Hypermedia Specification
This paper introduces XHMBS (the eXtended Hyperdocument Model Based on Statecharts) to support the formal specification of general hypermedia applications. XHMBS uses a novel form...
Fabiano Borges Paulo, Marcelo Augusto Santos Turin...
CSCW
2008
ACM
15 years 3 months ago
Are you sleeping?: sharing portrayed sleeping status within a social network
Within a group of peers, it is often useful or interesting to know whether someone in the group has gone to bed or whether they have awakened in the morning. This information, nat...
Sunyoung Kim, Julie A. Kientz, Shwetak N. Patel, G...
EGOV
2008
Springer
15 years 3 months ago
eGovernment Project Evaluation: An Integrated Framework
Recently, the EU government has put a lot of effort into modernizing its public sectors using advanced information and communication technology (ICT). Together with various univers...
Jianwei Liu, Zsófia Derzsi, Marta Raus, Ale...
JIPS
2006
110views more  JIPS 2006»
15 years 1 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...
IEEECIT
2010
IEEE
14 years 11 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao