Sciweavers

1311 search results - page 133 / 263
» Towards the ubiquitous Web
Sort
View
126
Voted
IWUC
2004
15 years 2 months ago
Protecting People on the Move through Virtual Personal Security
Ensuring personal safety for people on the move is becoming a heightened priority in today's uncertain environment. Traditional approaches are no longer adequate in meeting ri...
Dadong Wan, Anatole Gershman
ECEASST
2008
106views more  ECEASST 2008»
15 years 26 days ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan
87
Voted
JCP
2006
118views more  JCP 2006»
15 years 23 days ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
117
Voted
JUCS
2007
109views more  JUCS 2007»
15 years 21 days ago
On Ranking RDF Schema Elements (and its Application in Visualization)
Abstract: Ranking is a ubiquitous requirement whenever we confront a large collection of atomic or interrelated artifacts. This paper elaborates on this issue for the case of RDF s...
Yannis Tzitzikas, Dimitris Kotzinos, Yannis Theoha...
138
Voted
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 7 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...