Sciweavers

603 search results - page 41 / 121
» Determining Accessibility Needs Through User Goals
Sort
View
DMIN
2008
158views Data Mining» more  DMIN 2008»
13 years 10 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
EKNOW
2009
13 years 7 months ago
Towards a Context-Based Dialog Management Layer for Expert Systems
Knowledge engineering relies on a unified effort of two components for success: 1) a strong expert knowledge back-end, and 2) an effective user interface. We address the latter is...
Victor Chou Hung, Avelino J. Gonzalez, Ronald F. D...
ENTCS
2008
130views more  ENTCS 2008»
13 years 9 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
OSDI
2004
ACM
14 years 9 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
AICT
2009
IEEE
226views Communications» more  AICT 2009»
14 years 3 months ago
Optimizing MBMS Power Allocation through HSDPA Transmissions
— Multimedia Broadcast Multicast Service (MBMS) epitomizes the increasing popularity of enhanced end-user experience in Universal Mobile Telecommunications System (UMTS), since i...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...