Sciweavers

2777 search results - page 379 / 556
» The Challenges of Service Evolution
Sort
View
PERCOM
2009
ACM
16 years 5 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
CHI
2007
ACM
16 years 5 months ago
Rating, voting & ranking: designing for collaboration & consensus
The OpenChoice system, currently in development, is an open source, open access community rating and filtering service that would improve upon the utility of currently available W...
Don Turnbull
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
16 years 5 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
ICSE
2003
IEEE-ACM
16 years 5 months ago
Component Technology - What, Where, and How?
Software components, if usedproperly, ofj~r many software engineering benefits. Yet, they also pose many original challenges starting fi'om quality assurance and ranging to a...
Clemens A. Szyperski
PERCOM
2007
ACM
16 years 4 months ago
A User Interaction Model for NFC Enabled Applications
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each ...
Yaw Anokwa, Gaetano Borriello, Trevor Pering, Roy ...