Sciweavers

83 search results - page 16 / 17
» Situation Inference for Mobile Users: A Rule Based Approach
Sort
View
ICSOC
2004
Springer
13 years 11 months ago
Associating assertions with business processes and monitoring their execution
Business processes that span organizational borders describe the interaction between multiple parties working towards a common objective. They also express business rules that gov...
Alexander Lazovik, Marco Aiello, Mike P. Papazoglo...
KI
2010
Springer
13 years 4 months ago
An Extensible Modular Recognition Concept That Makes Activity Recognition Practical
Abstract. In mobile and ubiquitous computing, there is a strong need for supporting different users with different interests, needs, and demands. Activity recognition systems for c...
Martin Berchtold, Matthias Budde, Hedda Rahel Schm...
CHI
2003
ACM
14 years 6 months ago
The digital set-top box as a virtual channel provider
This research is based on the realization that the desktop computing paradigm is not appropriate for television, because it is adapted to fundamentally different user aspirations ...
Konstantinos Chorianopoulos
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
13 years 11 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
MOBIQUITOUS
2005
IEEE
13 years 12 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...