Sciweavers

201 search results - page 25 / 41
» An Authorization Logic With Explicit Time
Sort
View
IUI
2012
ACM
12 years 6 months ago
Automatic reverse engineering of interactive dynamic web applications to support adaptation across platforms
The effort and time required to develop user interface models has been one of the main limitations to the adoption of model-based approaches, which enable intelligent processing o...
Federico Bellucci, Giuseppe Ghiani, Fabio Patern&o...
EJWCN
2010
118views more  EJWCN 2010»
13 years 5 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
IUI
2010
ACM
14 years 7 months ago
Personalized news recommendation based on click behavior
Online news reading has become very popular as the web provides access to news articles from millions of sources around the world. A key challenge of news websites is to help user...
Jiahui Liu, Peter Dolan, Elin Rønby Pederse...
ADAEUROPE
2007
Springer
14 years 5 months ago
Towards the Testing of Power-Aware Software Applications for Wireless Sensor Networks
The testing of programs in wireless sensor networks (WSN) is an important means to assure quality but is a challenging process. As pervasive computing has been identified as a not...
W. K. Chan, Tsong Yueh Chen, S. C. Cheung, T. H. T...
QSIC
2005
IEEE
14 years 4 months ago
Fault-Based Testing of Database Application Programs with Conceptual Data Model
Database application programs typically contain program units that use SQL statements to manipulate records in database instances. Testing the correctness of data manipulation by ...
W. K. Chan, S. C. Cheung, T. H. Tse