Sciweavers

30240 search results - page 5978 / 6048
» Robust System Design
Sort
View
127
Voted
ATAL
2008
Springer
15 years 5 months ago
A context-aware personal desktop assistant
We demonstrate an intelligent personal assistant agent that has been developed to aid a busy knowledge worker in managing time commitments and performing tasks. The PExA agent dra...
Hung Hai Bui, Federico Cesari, Daniel Elenius, Dav...
ATAL
2008
Springer
15 years 5 months ago
Content-oriented composite service negotiation with complex preferences
In e-commerce, for some cases the service requested by the consumer cannot be fulfilled by the producer. In such cases, service consumers and producers need to negotiate their ser...
Reyhan Aydogan
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
CCS
2008
ACM
15 years 5 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
167
Voted
CIKM
2008
Springer
15 years 5 months ago
Identifying table boundaries in digital documents via sparse line detection
Most prior work on information extraction has focused on extracting information from text in digital documents. However, often, the most important information being reported in an...
Ying Liu, Prasenjit Mitra, C. Lee Giles
« Prev « First page 5978 / 6048 Last » Next »