Sciweavers

1929 search results - page 383 / 386
» An Approach to Limit the Wynot Problem
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
SAC
2005
ACM
14 years 1 months ago
Retrieving lightly annotated images using image similarities
Users’ search needs are often represented by words and images are retrieved according to such textual queries. Annotation words assigned to the stored images are most useful to ...
Masashi Inoue, Naonori Ueda
ICICS
2005
Springer
14 years 1 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
KES
2005
Springer
14 years 29 days ago
Position Estimation for Goods Tracking System Using Mobile Detectors
Abstract. Determining physical location of indoor objects is one of the key issues in ubiquitous computing. Although there are many proposals to provide physical location tracking,...
Hiroshi Mineno, Kazuo Hida, Miho Mizutani, Naoto M...
TABLEAUX
2005
Springer
14 years 29 days ago
A Tableau-Based Explainer for DL Subsumption
This paper describes the implementation of a tableau-based reasoning component which is capable of providing quasi natural language explanations for subsumptions within ALEHFR+ TBo...
Thorsten Liebig, Michael Halfmann