Sciweavers

5101 search results - page 220 / 1021
» Capturing Context Requirements
Sort
View
ALGOSENSORS
2009
Springer
14 years 28 days ago
On Active Attacks on Sensor Network Key Distribution Schemes
This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attack...
Stefan Dziembowski, Alessandro Mei, Alessandro Pan...
DAWAK
2001
Springer
14 years 24 days ago
Discovering Web Document Associations for Web Site Summarization
Complex web information structures prevent search engines from providing satisfactory context-sensitive retrieval. We see that in order to overcome this obstacle, it is essential t...
K. Selçuk Candan, Wen-Syan Li
GI
2001
Springer
14 years 23 days ago
Corporate Information Network (COIN): The Fraunhofer IESE Experience Factory
Experience-based continuous learning is essential for improving products, processes, and technologies in emerging as well as established areas of business and engineering science....
Andreas Jedlitschka, Klaus-Dieter Althoff, Bjö...
WMCSA
2000
IEEE
14 years 20 days ago
Adding some smartness to devices and everyday things
In mobile computing, context-awareness indicates the ability of a system to obtain and use information on aspects of the system environment. To implement contextawareness, mobile ...
Hans-Werner Gellersen, Albrecht Schmidt, Michael B...
HICSS
1998
IEEE
142views Biometrics» more  HICSS 1998»
14 years 16 days ago
Meetings in a Virtual Space: Creating a Digital Document
Improvements in computer network infrastructures and information utilities have led to an increase in the number of social and work interactions carried out `virtually' by ge...
Lori Toomey, Lia Adams, Elizabeth F. Churchill