Sciweavers

2650 search results - page 286 / 530
» Personalization in E-Commerce Applications
Sort
View
SAC
2009
ACM
15 years 11 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
ICCSA
2009
Springer
15 years 11 months ago
Towards Location-Based Real-Time Monitoring Systems in u-LBS
Recently, ubiquitous location-based services (u-LBS) has been utilized in a variety of practical and mission-critical applications such as security services, personalization servic...
MoonBae Song, Hyunseung Choo
ICAS
2009
IEEE
109views Robotics» more  ICAS 2009»
15 years 11 months ago
Ponder2: A Policy System for Autonomous Pervasive Environments
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale ne...
Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris...
AGS
2009
Springer
15 years 11 months ago
Two Case Studies for Jazzyk BSM
Recently, we introduced Behavioural State Machines (BSM ), a novel programming framework for development of cognitive agents with Jazzyk, its associated programming language and in...
Michael Köster, Peter Novák, David Mai...
AIED
2009
Springer
15 years 11 months ago
Who Helps When the Tutor Is Asleep?
While many computer tutoring systems have long been delivered as desktop applications, these systems have only recently begun to appear on mobile devices. In this work we apply pri...
Quincy Brown, Dario D. Salvucci, Frank J. Lee, Vin...