Sciweavers

2799 search results - page 458 / 560
» Ontological technologies for user modelling
Sort
View
IH
2001
Springer
14 years 2 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
CIKM
1993
Springer
14 years 2 months ago
Model-driven Hypermedia Access to Weather Information
: A framework is presented for hypermedia access to weather information originating from gridded data sets. The information is presented on different media (map, text, graph, table...
Stephan M. Kerpedjiev
DEBS
2007
ACM
14 years 2 months ago
Towards a theory of events
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...
K. Mani Chandy, Michel Charpentier, Agostino Cappo...
COOPIS
2004
IEEE
14 years 1 months ago
Refresco: Improving Query Performance Through Freshness Control in a Database Cluster
Abstract. We consider the use of a cluster system for managing autonomous databases. In order to improve the performance of read-only queries, we strive to exploit user requirement...
Cécile Le Pape, Stéphane Ganç...
COCOON
2008
Springer
13 years 12 months ago
Spectrum Bidding in Wireless Networks and Related
In this paper, we study the spectrum assignment problem for wireless access networks. Opportunistic spectrum usage is a promising technology. However, it could suffer from the self...
Xiang-Yang Li, Ping Xu, ShaoJie Tang, Xiaowen Chu