Sciweavers

1517 search results - page 215 / 304
» Time and Location Based Services with Access Control
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 4 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
PIMRC
2008
IEEE
15 years 4 months ago
A resource allocation scheme to achieve fairness in TH-UWB sensor networks with near-far effects
— The inherent near-far effect in wireless networks causes nodes that are further away from the receiver to suffer from throughput degradation, as packets from nodes that are nea...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Hwee-X...
CIKM
2001
Springer
15 years 2 months ago
Tempus Fugit: A System for Making Semantic Connections
Tempus Fugit (“Time Flies”) is the first of a new generation of Personal Information Management (PIM) systems. A PIM system incorporates an electronic calendar, “to-do” li...
Daniel Alexander Ford, Joann Ruvolo, Stefan Edlund...
RECSYS
2010
ACM
14 years 10 months ago
Global budgets for local recommendations
We present the design, implementation and evaluation of a new geotagging service, Gloe, that makes it easy to find, rate and recommend arbitrary on-line content in a mobile settin...
Thomas Sandholm, Hang Ung, Christina Aperjis, Bern...
COBUILD
1999
Springer
15 years 2 months ago
OWL: An Object-Oriented Framework for Intelligent Home and Office Applications
The goal of OWL (Object-Oriented Workplace Laboratory) is to provide an object-oriented and component-based framework that supports the engineering of applications for the design, ...
Bernd Brügge, Ralf Pfleghar, Thomas Reicher