Sciweavers

1054 search results - page 82 / 211
» From Mobility Management to Connectivity Management
Sort
View
WISA
2009
Springer
14 years 4 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
CIKM
2008
Springer
14 years 3 days ago
Social capital in online communities
Online communities are connecting hordes of individuals and generating rich social network data. The social capital that resides within these networks is largely unknown. We propo...
Matthew S. Smith
EATIS
2007
ACM
14 years 2 months ago
Techniques for location selection on a mobile device
In the current paper we present a field comparison of techniques for selecting one's current location in mobile locationbased systems. Four location selection techniques are ...
Mika Luimula, Kirsti Sääskilahti, Timo P...
ISM
2005
IEEE
151views Multimedia» more  ISM 2005»
14 years 3 months ago
Video Data Mining: Mining Semantic Patterns with temporal constraints from Movies
— For efficient video data management, ‘video data mining’ is required to discover ‘semantic patterns’ which are not only previously unknown and interesting, but also as...
Kimiaki Shirahama, Koichi Ideno, Kuniaki Uehara
AIME
2003
Springer
14 years 3 months ago
The NewGuide Project: Guidelines, Information Sharing and Learning from Exceptions
Among the well agreed-on benefits of a guideline computerisation, with respect to the traditional text format, there are the disambiguation, the possibility of looking at the guide...
Paolo Ciccarese, Ezio Caffi, Lorenzo Boiocchi, Ass...