Sciweavers

70 search results - page 6 / 14
» Exploiting the Annotation Practice for Personal and Collecti...
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ESWS
2008
Springer
13 years 9 months ago
Semantic Email as a Communication Medium for the Social Semantic Desktop
In this paper, we introduce a formal email workflow model based on traditional email, which enables the user to define and execute ad-hoc workflows in an intuitive way. This model ...
Simon Scerri, Siegfried Handschuh, Stefan Decker
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
14 years 7 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
WWW
2003
ACM
14 years 21 days ago
The Web of People: A dual view on the WWW
In this paper, we describe an alternative web paradigm, called the Web of People. Rather than a web of pages, it is a web of persons. The paradigm is motivated by a number of obvi...
Michel Plu, Pascal Bellec, Layda Agosto, Walter Va...