Sciweavers

975 search results - page 113 / 195
» A hotel information system implementation using MAS technolo...
Sort
View
INFORMATICALT
2000
120views more  INFORMATICALT 2000»
15 years 3 months ago
Mobile Code Alternatives for Secure Environments
Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be...
Algirdas Pakstas, Igor Shagaev
WWW
2003
ACM
16 years 4 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
GIS
2010
ACM
15 years 2 months ago
Querying geo-social data by bridging spatial networks and social networks
Recording the location of people using location-acquisition technologies, such as GPS, allows generating life patterns, which associate people to places they frequently visit. Con...
Yerach Doytsher, Ben Galon, Yaron Kanza
ICETE
2004
253views Business» more  ICETE 2004»
15 years 5 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
RR
2010
Springer
15 years 2 months ago
KWilt: A Semantic Patchwork for Flexible Access to Heterogeneous Knowledge
Semantic wikis and other modern knowledge management systems deviate from traditional knowledge bases in that information ranges from unstructured (wiki pages) over semi-formal (ta...
Klara A. Weiand, Steffen Hausmann, Tim Furche, Fra...