Sciweavers

262 search results - page 15 / 53
» Meetings and meeting modeling in smart environments
Sort
View
ICAIL
2007
ACM
13 years 11 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
JCP
2007
92views more  JCP 2007»
13 years 7 months ago
Lifelong Learning, Empirical Modelling and the Promises of Constructivism
—Educational technology is seen as key for lifelong learning, but it has yet to live up to expectation. We argue that current learning environments are typically oriented too muc...
Meurig Beynon, Antony Harfield
PERCOM
2003
ACM
14 years 7 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
13 years 5 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross
AAAI
2007
13 years 10 months ago
On Capturing Semantics in Ontology Mapping
Ontology mapping is a complex and necessary task for many Semantic Web (SW) applications. The perspective users are faced with a number of challenges including the difficulties o...
Bo Hu, Srinandan Dasmahapatra, Paul H. Lewis, Nige...