Sciweavers

1625 search results - page 119 / 325
» Intentionality
Sort
View
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 4 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
HAID
2007
Springer
14 years 4 months ago
Designing Eyes-Free Interaction
As the form factors of computational devices diversify, the concept of eyes-free interaction is becoming increasingly relevant: it is no longer hard to imagine use scenarios in whi...
Ian Oakley, Junseok Park
ICSOC
2007
Springer
14 years 4 months ago
Mobile Ontology: Towards a Standardized Semantic Model for the Mobile Domain
Ontologies will be crucial for the future development of Next Generation Service Delivery Platforms. While various projects have defined ontologies for the mobile domain, there is ...
Claudia Villalonga, Martin Strohbach, Niels Snoeck...
IDEAL
2007
Springer
14 years 4 months ago
Partitioning-Clustering Techniques Applied to the Electricity Price Time Series
Clustering is used to generate groupings of data from a large dataset, with the intention of representing the behavior of a system as accurately as possible. In this sense, cluster...
Francisco Martínez-Álvarez, Alicia T...
ISPA
2007
Springer
14 years 4 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong