Sciweavers

792 search results - page 40 / 159
» A Proposal of the Person-centered Approach for Personal Task...
Sort
View
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
14 years 23 days ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
GLOBECOM
2008
IEEE
14 years 3 months ago
Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...
Niklas Neumann, Xiaoming Fu
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
14 years 9 months ago
Exploiting context analysis for combining multiple entity resolution systems
Entity Resolution (ER) is an important real world problem that has attracted significant research interest over the past few years. It deals with determining which object descript...
Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotr...
EMSOFT
2011
Springer
12 years 8 months ago
Aciom: application characteristics-aware disk and network i/o management on android platform
The last several years have seen a rapid increase in smart phone use. Android offers an open-source software platform on smart phones, that includes a Linux-based kernel, Java app...
Hyosu Kim, Minsub Lee, Wookhyun Han, Kilho Lee, In...
CIKM
2008
Springer
13 years 11 months ago
Conflict ontology enrichment based on triggers
In this paper, we propose an ontology-based approach that enables to detect the emergence of relational conflicts between persons that cooperate on computer supported projects. In...
Chahnez Zakaria, Olivier Curé, Kamel Sma&iu...