Sciweavers

314 search results - page 50 / 63
» Technology Challenges for Building Internet-Scale Ubiquitous...
Sort
View
PERCOM
2005
ACM
16 years 26 days ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
148
Voted
KES
2004
Springer
15 years 6 months ago
An Efficient Fuzzy Method for Handwritten Character Recognition
The main challenge in handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time. Du...
Romesh Ranawana, Vasile Palade, G. E. M. D. C. Ban...
UIC
2010
Springer
14 years 11 months ago
Extracting Social and Community Intelligence from Digital Footprints: An Emerging Research Area
As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network i...
Daqing Zhang, Bin Guo, Bin Li, Zhiwen Yu
AAAI
2007
15 years 3 months ago
The VITA Financial Services Sales Support Environment
Knowledge-based recommender technologies support customers and sales representatives in the identification of appropriate products and services. These technologies are especially ...
Alexander Felfernig, Klaus Isak, Kalman Szabo, Pet...
SIGCSE
2005
ACM
134views Education» more  SIGCSE 2005»
15 years 6 months ago
Enhancing team knowledge: instruction vs. experience
Information technology projects are growing in complexity and require teams to solve problems and develop solutions. With current undergraduate, computer science and information s...
Debra L. Smarkusky, Richard F. Dempsey, Joan J. Lu...