Sciweavers

981 search results - page 184 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
SAC
2004
ACM
15 years 5 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
AAAI
2007
15 years 2 months ago
Adaptive Localization in a Dynamic WiFi Environment through Multi-view Learning
Accurately locating users in a wireless environment is an important task for many pervasive computing and AI applications, such as activity recognition. In a WiFi environment, a m...
Sinno Jialin Pan, James T. Kwok, Qiang Yang, Jeffr...
IRI
2006
IEEE
15 years 5 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
102
Voted
SIGIR
2002
ACM
14 years 11 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
SKG
2006
IEEE
15 years 5 months ago
XML Metadata Services
— As the Service Oriented Architecture (SOA) principles have gained importance, an emerging need has appeared for methodologies to locate desired services that provide access to ...
Mehmet S. Aktas, Sangyoon Oh, Geoffrey Fox, Marlon...