Sciweavers

1330 search results - page 250 / 266
» An interactive service customization model
Sort
View
TMC
2012
11 years 10 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
MSS
1999
IEEE
99views Hardware» more  MSS 1999»
13 years 12 months ago
Clustered Multi-media NOD: Popularity-based Article Prefetching and Placement
According to the current profound development of multimedia and networking technologies, the way people communicate with, naturally, has evolved from a textoriented into a multime...
Y.-J. Kim, Tae-uk Choi, K. O. Jung, Y. K. Kang, Se...
IJWIS
2006
104views more  IJWIS 2006»
13 years 7 months ago
DaVinci - A model-driven web engineering framework
The World Wide Web has undergone a rapid transition from the originally static hypertext to an ubiquitous hypermedia system. Today, the Web is not only used as a basis for distribu...
Andreas Langegger, Jürgen Palkoska, Roland Wa...
JKM
2007
126views more  JKM 2007»
13 years 7 months ago
The moderating role of human capital management practices on employee capabilities
Purpose – The purpose of this paper is to suggest and empirically test a model that explains employee capabilities from the knowledge-based perspective. In this model, human cap...
Nick Bontis, Alexander Serenko
WWW
2002
ACM
14 years 8 months ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...