Sciweavers

875 search results - page 140 / 175
» Requirements for Context-Dependent Mobile Access to Informat...
Sort
View
GIS
2008
ACM
15 years 10 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
WWW
2008
ACM
15 years 10 months ago
Finding the right facts in the crowd: factoid question answering over social media
Community Question Answering has emerged as a popular and effective paradigm for a wide range of information needs. For example, to find out an obscure piece of trivia, it is now ...
Jiang Bian, Yandong Liu, Eugene Agichtein, Hongyua...
EUROPKI
2004
Springer
15 years 3 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
JUCS
2008
109views more  JUCS 2008»
14 years 9 months ago
Seamless Transition between Connected and Disconnected Collaborative Interaction
Abstract: Nowadays, more and more users make use of web-based collaborative systems. Users participate in communities or search for and provide information in webbased systems. The...
Stephan Lukosch