Sciweavers

5101 search results - page 220 / 1021
» Capturing Context Requirements
Sort
View
ALGOSENSORS
2009
Springer
15 years 8 months ago
On Active Attacks on Sensor Network Key Distribution Schemes
This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attack...
Stefan Dziembowski, Alessandro Mei, Alessandro Pan...
DAWAK
2001
Springer
15 years 7 months ago
Discovering Web Document Associations for Web Site Summarization
Complex web information structures prevent search engines from providing satisfactory context-sensitive retrieval. We see that in order to overcome this obstacle, it is essential t...
K. Selçuk Candan, Wen-Syan Li
GI
2001
Springer
15 years 7 months ago
Corporate Information Network (COIN): The Fraunhofer IESE Experience Factory
Experience-based continuous learning is essential for improving products, processes, and technologies in emerging as well as established areas of business and engineering science....
Andreas Jedlitschka, Klaus-Dieter Althoff, Bjö...
WMCSA
2000
IEEE
15 years 7 months ago
Adding some smartness to devices and everyday things
In mobile computing, context-awareness indicates the ability of a system to obtain and use information on aspects of the system environment. To implement contextawareness, mobile ...
Hans-Werner Gellersen, Albrecht Schmidt, Michael B...
HICSS
1998
IEEE
142views Biometrics» more  HICSS 1998»
15 years 7 months ago
Meetings in a Virtual Space: Creating a Digital Document
Improvements in computer network infrastructures and information utilities have led to an increase in the number of social and work interactions carried out `virtually' by ge...
Lori Toomey, Lia Adams, Elizabeth F. Churchill