Sciweavers

2580 search results - page 335 / 516
» Systems for human-powered mobile computing
Sort
View
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
15 years 10 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
ICDCSW
2003
IEEE
15 years 10 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
WCNC
2010
IEEE
15 years 8 months ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
129
Voted
FLAIRS
2003
15 years 6 months ago
An Extension of the Differential Approach for Bayesian Network Inference to Dynamic Bayesian Networks
We extend the differential approach to inference in Bayesian networks (BNs) (Darwiche, 2000) to handle specific problems that arise in the context of dynamic Bayesian networks (D...
Boris Brandherm
ENTCS
2008
102views more  ENTCS 2008»
15 years 4 months ago
Encoding Distributed Process Calculi into LMNtal
Towards a unifying model of concurrency, we have designed and implemented LMNtal (pronounced "elemental"), a model and language based on hierarchical graph rewriting tha...
Kazunori Ueda