Sciweavers

11129 search results - page 28 / 2226
» Modeling Search Computing Applications
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
14 years 1 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
LOGCOM
2010
123views more  LOGCOM 2010»
13 years 9 months ago
The Hyper Tableaux Calculus with Equality and an Application to Finite Model Computation
In most theorem proving applications, a proper treatment of equational theories or equality is mandatory. In this paper we show how to integrate a modern treatment of equality in ...
Peter Baumgartner, Ulrich Furbach, Björn Pelz...
FLAIRS
2007
14 years 1 months ago
Annotation of Children's Oral Narrations: Modeling Emergent Narrative Skills for Computational Applications
We present an annotation method for developing a model of children’s comprehension that differentiates between their recall for the objective content of a story and inferred con...
Rebecca J. Passonneau, Adam Goodkind, Elena T. Lev...
MSWIM
2006
ACM
14 years 4 months ago
Performance modeling of critical event management for ubiquitous computing applications
A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical eve...
Tridib Mukherjee, Krishna M. Venkatasubramanian, S...
ICPPW
2006
IEEE
14 years 5 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed