Sciweavers

2663 search results - page 184 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
JAIHC
2010
134views more  JAIHC 2010»
14 years 9 months ago
Towards a new human-centred computing methodology for cooperative ambient intelligence
Cooperative ambient intelligence aims to improve users’ work and private life by analysing their current situation with a special focus on their social interaction and to adapt t...
Tom Gross
AMI
2010
Springer
14 years 8 months ago
Dynamic Privacy Management in Pervasive Sensor Networks
This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our...
Nan-Wei Gong, Mathew Laibowitz, Joseph A. Paradiso
IJPRAI
2010
105views more  IJPRAI 2010»
14 years 8 months ago
An Ontology-Based Model for Representing Image Processing Application Objectives
This paper investigates what kinds of information are necessary and sufficient to design and evaluate image processing software programs and proposes a representation of these inf...
Régis Clouard, Arnaud Renouf, Marinette Rev...
WWW
2007
ACM
15 years 11 months ago
Cantina: a content-based approach to detecting phishing web sites
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002
CLUSTER
2007
IEEE
15 years 5 months ago
High performance virtual machine migration with RDMA over modern interconnects
— One of the most useful features provided by virtual machine (VM) technologies is the ability to migrate running OS instances across distinct physical nodes. As a basis for many...
Wei Huang, Qi Gao, Jiuxing Liu, Dhabaleswar K. Pan...