Sciweavers

1710 search results - page 316 / 342
» Sharing Engineering Information and Knowledge
Sort
View
SASN
2006
ACM
15 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
107
Voted
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 2 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
DOCENG
2003
ACM
15 years 2 months ago
Context representation, transformation and comparison for ad hoc product data exchange
Product data exchange is the precondition of business interoperation between Web-based firms. However, millions of small and medium sized enterprises (SMEs) encode their Web produ...
Jingzhi Guo, Chengzheng Sun
73
Voted
VLDB
2000
ACM
133views Database» more  VLDB 2000»
15 years 1 months ago
Memex: A Browsing Assistant for Collaborative Archiving and Mining of Surf Trails
Keyword indices, topic directories, and link-based rankings are used to search and structure the rapidly growing Web today. Surprisingly little use is made of years of browsing ex...
Soumen Chakrabarti, Sandeep Srivastava, Mallela Su...
107
Voted
FOIS
2006
14 years 11 months ago
Against Idiosyncrasy in Ontology Development
The world of ontology development is full of mysteries. Recently, ISO Standard 15926 ("Lifecycle Integration of Process Plant Data Including Oil and Gas Production Facilities&...
Barry Smith