Sciweavers

314 search results - page 43 / 63
» Technology Challenges for Building Internet-Scale Ubiquitous...
Sort
View
IWANN
2009
Springer
15 years 7 months ago
Agents Jumping in the Air: Dream or Reality?
Mobile agent technology has traditionally been recognized as a very useful approach to build applications for mobile computing and wireless environments. However, only a few studie...
Oscar Urra, Sergio Ilarri, Eduardo Mena
CLEIEJ
2010
14 years 10 months ago
Logic Programming: Can the learning and teaching process be improved apart from standards adopted by most professors and establi
Logic programming is one of the most important subjects for students pursuing a degree in Information Technology and Communication (ITC) at higher education institutions. Teaching ...
Ricardo Luiz B. L. Campos
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 10 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CCS
2007
ACM
15 years 5 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
CIKM
2007
Springer
15 years 7 months ago
Effective top-k computation in retrieving structured documents with term-proximity support
Modern web search engines are expected to return top-k results efficiently given a query. Although many dynamic index pruning strategies have been proposed for efficient top-k com...
Mingjie Zhu, Shuming Shi, Mingjing Li, Ji-Rong Wen