Sciweavers

975 search results - page 99 / 195
» A hotel information system implementation using MAS technolo...
Sort
View
114
Voted
SISW
2003
IEEE
15 years 9 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
WWW
2007
ACM
16 years 4 months ago
A content-driven reputation system for the wikipedia
We present a content-driven reputation system for Wikipedia authors. In our system, authors gain reputation when the edits they perform to Wikipedia articles are preserved by subs...
B. Thomas Adler, Luca de Alfaro
155
Voted
ENTCS
2006
127views more  ENTCS 2006»
15 years 4 months ago
A System Architecture for Context-Aware Service Discovery
Recent technological advances have enabled both the consumption and provision of mobile services (m-services) by small, portable, handheld devices. However, mobile devices still h...
Christos Doulkeridis, Nikos Loutas, Michalis Vazir...
GIS
2009
ACM
16 years 5 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
ICC
2007
IEEE
15 years 10 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...