Sciweavers

1941 search results - page 70 / 389
» The architecture design of a cross-domain context management...
Sort
View
MOBISYS
2009
ACM
16 years 1 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 5 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ATAL
2006
Springer
15 years 5 months ago
An adaptive plan-based dialogue agent: integrating learning into a BDI architecture
We consider the problem of dialogue adaptation in our Smart Personal Assistant (SPA), which uses a plan-based dialogue model. We present a novel way of integrating learning into a...
Anh Nguyen, Wayne Wobcke
EFDBS
2000
15 years 2 months ago
Managing Multimedia Assets with Federated Join
We describe the architecture of a federated system designed to allow the integration of structured, relational, data together with unstructured multimedia data. Two characteristic...
Alan Cole, Jim Christensen, Howard Sachar, Oleg Du...
CAISE
2001
Springer
15 years 5 months ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier