Sciweavers

8337 search results - page 1459 / 1668
» Reasoning With Characteristic Models
Sort
View
126
Voted
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 11 months ago
Adoption of Mobile Devices/Services - Searching for Answers with the UTAUT
The future of mobile telephony is expected to rely on mobile services and the use of mobile services will be an integral part of the revenues to be generated by third generation m...
Christer Carlsson, Joanna Carlsson, Kaarina Hyv&ou...
122
Voted
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 11 months ago
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures
Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Guido Schryen
ICDCSW
2006
IEEE
15 years 11 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
154
Voted
ICDCSW
2006
IEEE
15 years 11 months ago
CoCoA: Coordinated Cooperative Localization for Mobile Multi-Robot Ad Hoc Networks
Mobile robot teams are particularly suited to applications where infrastructure is unavailable or damaged since they can be used to quickly form an infrastructure-less mobile ad h...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
15 years 11 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi
« Prev « First page 1459 / 1668 Last » Next »