Sciweavers

10625 search results - page 1839 / 2125
» Supporting delay-intolerant applications
Sort
View
MHCI
2009
Springer
15 years 5 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
MHCI
2009
Springer
15 years 5 months ago
Exploring the urban environment with a camera phone: lessons from a user study
We present a study investigating two novel mobile services supporting querying for information in the urban environment using camera equipped smart phones as well as two different...
Norman Höller, Arjan Geven, Manfred Tscheligi...
MIDDLEWARE
2009
Springer
15 years 5 months ago
Middleware for Pervasive Spaces: Balancing Privacy and Utility
Abstract. Middleware for pervasive spaces has to meet conflicting requirements. It has to both maximize the utility of the information exposed and ensure that this information doe...
Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, S...
OTM
2009
Springer
15 years 5 months ago
Efficient Management of Biomedical Ontology Versions
Abstract. Ontologies have become very popular in life sciences and other domains. They mostly undergo continuous changes and new ontology versions are frequently released. However,...
Toralf Kirsten, Michael Hartung, Anika Gross, Erha...
78
Voted
SAFECOMP
2009
Springer
15 years 5 months ago
Probabilistic Failure Propagation and Transformation Analysis
A key concern in safety engineering is understanding the overall emergent failure behaviour of a system, i.e., behaviour exhibited by the system that is outside its specification ...
Xiaocheng Ge, Richard F. Paige, John A. McDermid
« Prev « First page 1839 / 2125 Last » Next »