Sciweavers

2253 search results - page 411 / 451
» Tourism and Mobile Technology
Sort
View
IH
2001
Springer
15 years 6 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
SIGOPSE
2000
ACM
15 years 6 months ago
A system architecture for pervasive computing
Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing. But, while...
Robert Grimm, Thomas E. Anderson, Brian N. Bershad...
124
Voted
ITNG
2010
IEEE
15 years 6 months ago
QARI: Quality Aware Software Deployment for Wireless Sensor Networks
Abstract--If we are to deploy sensor applications in a realistic business context, we must provide innovative middleware services to control and enforce required system behavior; i...
Wouter Horré, Sam Michiels, Wouter Joosen, ...
119
Voted
SIGMOD
1999
ACM
135views Database» more  SIGMOD 1999»
15 years 6 months ago
Improving OLTP Data Quality Using Data Warehouse Mechanisms
Research and products for the integration of heterogeneous legacy source databases in data warehousing have addressed numerous data quality problems in or between the sources. Suc...
Matthias Jarke, Christoph Quix, Guido Blees, Dirk ...
CIA
1999
Springer
15 years 6 months ago
Digital City Kyoto: Towards a Social Information Infrastructure
This paper proposes the concept of digital cities as a social information infrastructure for urban life (including shopping, business, transportation, education, welfare and so on)...
Toru Ishida, Jun-ichi Akahani, Kaoru Hiramatsu, Ka...