Sciweavers

2162 search results - page 87 / 433
» E-Crime Investigative Technologies
Sort
View
ESWS
2009
Springer
14 years 4 months ago
Decidability of SHI with Transitive Closure of Roles
This paper investigates a Description Logic, namely SHI+, which extends SHI by adding transitive closure of roles. The resulting logic SHI+ allows transitive closure of roles to oc...
Chan Le Duc
GLOBECOM
2008
IEEE
14 years 4 months ago
Passive Ultrawide Bandwidth RFID
Abstract—Ultrawide bandwidth (UWB) technology is a promising solution for next generation radiofrequency identification (RFID) systems to overcome most of the main limitations o...
Davide Dardari, Raffaele D'Errico
AH
2008
Springer
14 years 4 months ago
Do Students Trust Their Open Learner Models?
Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...
Norasnita Ahmad, Susan Bull
WETICE
2006
IEEE
14 years 3 months ago
A Trust-enabled P2P Recommender System
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
Georgios Pitsilis, Lindsay Marshall
ITCC
2005
IEEE
14 years 3 months ago
An Analysis of Reliable Delivery Specifications for Web Services
Reliable delivery of messages is now a key component of the Web Services roadmap, with two promising, and competing, specifications in this area viz. WS-Reliability (WSR) from OAS...
Shrideep Pallickara, Geoffrey Fox, Sangmi Lee Pall...