Sciweavers

9162 search results - page 1607 / 1833
» System and User Data Complexity
Sort
View
HUC
2005
Springer
15 years 9 months ago
Analysis of Chewing Sounds for Dietary Monitoring
The paper reports the results of the first stage of our work on an automatic dietary monitoring system. The work is part of a large European project on using ubiquitous systems to...
Oliver Amft, Mathias Stäger, Paul Lukowicz, G...
PDCAT
2005
Springer
15 years 9 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
PET
2005
Springer
15 years 9 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
RE
2005
Springer
15 years 9 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
« Prev « First page 1607 / 1833 Last » Next »