Sciweavers

1352 search results - page 216 / 271
» Designing Security Requirements Models Through Planning
Sort
View
IIWAS
2008
13 years 10 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
SAC
2005
ACM
14 years 2 months ago
Towards system software for physical space applications
In ubiquitous computing era, the notion of context-awareness will play an important role. An application should be aware of its operating context for supporting and enriching huma...
Kaori Fujinami, Tatsuo Nakajima
ICWE
2004
Springer
14 years 2 months ago
Getting Ready Web Engineering Methods for the Semantic Web
Current Web Engineering methods develop "closed" web applications from conceptual models. This fact makes difficult the integration and the interoperability of different ...
Victoria Torres, Joan Fons, Oscar Asensi, Vicente ...
WSC
2001
13 years 10 months ago
Simulating networks of wireless sensors
Recent advances in low-power embedded processors, radios, and micro-mechanical systems (MEMs) have made possible the development of networks of wirelessly interconnected sensors. ...
Sung Park, Andreas Savvides, Mani B. Srivastava
SEMWEB
2010
Springer
13 years 6 months ago
Fusion - Visually Exploring and Eliciting Relationships in Linked Data
Building applications over Linked Data often requires a mapping between the application model and the ontology underlying the source dataset in the Linked Data cloud. This mapping ...
Samur Araújo, Geert-Jan Houben, Daniel Schw...