Sciweavers

5446 search results - page 1076 / 1090
» Mobile computing
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 2 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
EURONGI
2005
Springer
14 years 2 months ago
Receiver Oriented Trajectory Based Forwarding
Abstract— Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requ...
Antonio Capone, Ilario Filippini, Luigi Fratta, Lu...
INTETAIN
2005
Springer
14 years 2 months ago
COMPASS2008: The Smart Dining Service
The Compass20083 project is a sino-german cooperation, aiming at integrating advanced information technologies to create a hightech information system that helps visitors to access...
Ilhan Aslan, Feiyu Xu, Jörg Steffen, Hans Usz...
SEMWEB
2005
Springer
14 years 2 months ago
RelExt: A Tool for Relation Extraction from Text in Ontology Extension
Abstract. Domain ontologies very rarely model verbs as relations holding between concepts. However, the role of the verb as a central connecting element between concepts is undenia...
Alexander Schutz, Paul Buitelaar
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
« Prev « First page 1076 / 1090 Last » Next »