Sciweavers

708 search results - page 37 / 142
» Implementing access control to people location information
Sort
View
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
CHI
2008
ACM
14 years 8 months ago
Increasing the accessibility of pen-based technology: an investigation of age-related target acquisition difficulties
This paper describes the author's dissertation research on improving the accessibility of penbased technology. The first step for this research was to gather information on t...
Karyn Moffatt
BIRD
2008
Springer
13 years 9 months ago
Translational Control by RNA-RNA Interaction: Improved Computation of RNA-RNA Binding Thermodynamics
The thermodynamics of RNA-RNA interaction consists of two components: the energy necessary to make a potential binding region accessible, i.e., unpaired, and the energy gained from...
Ulrike Mückstein, Hakim Tafer, Stephan H. F. ...
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
14 years 1 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...
ISI
2005
Springer
14 years 1 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores