Sciweavers

1061 search results - page 151 / 213
» Integrity Constraints for Linked Data
Sort
View
CHI
2005
ACM
13 years 12 months ago
Why use memo for all?: restructuring mobile applications to support informal note taking
Informal note taking is an essential activity in Personal Information Management (PIM). Most mobile devices support this via a suite of applications, employing both highly structu...
Liwei Dai, Wayne G. Lutters, Carlie Bower
DICTA
2007
13 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ICWS
2003
IEEE
13 years 11 months ago
Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges
Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across variou...
Vagan Y. Terziyan, Oleksandr Kononenko
SOSP
1993
ACM
13 years 11 months ago
Handling Audio and Video Streams in a Distributed Environment
Handling audio and video in a digital environment requires timely delivery of data. This paper describes the principles adopted in the design of the Pandora networked multi-media ...
Alan Jones, Andrew Hopper
ESWS
2010
Springer
13 years 11 months ago
OKBook: Peer-to-Peer Community Formation
Many systems exist for community formation in extensions of traditional Web environments but little work has been done for forming and maintaining communities in the more dynamic e...
Xi Bai, Wamberto Vasconcelos, Dave Robertson