Sciweavers

72 search results - page 8 / 15
» Device temporal forensics: An information theoretic approach
Sort
View
ACMSE
2010
ACM
13 years 5 months ago
Mobile web search personalization using ontological user profile
Most present day search engines have a deterministic behavior in the sense that they return the same search results for all users who submit the same query at a certain time. They...
Kapil Goenka, Ismailcem Budak Arpinar, Mustafa Nur...
EWSN
2004
Springer
14 years 6 months ago
Context-Aware Sensors
Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
Eiman Elnahrawy, Badri Nath
AISB
2008
Springer
13 years 9 months ago
Cognition without content
According to the traditional conception of the mind, semantical content is perhaps the most important feature distinguishing mental from non-mental systems. And this traditional co...
Paul Schweizer
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
CSE
2009
IEEE
14 years 1 months ago
Web Science 2.0: Identifying Trends through Semantic Social Network Analysis
—We introduce a novel set of social network analysis based algorithms for mining the Web, blogs, and online forums to identify trends and find the people launching these new tren...
Peter A. Gloor, Jonas Krauss, Stefan Nann, Kai Fis...