Sciweavers

2650 search results - page 287 / 530
» Personalization in E-Commerce Applications
Sort
View
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
15 years 11 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
UIC
2009
Springer
15 years 11 months ago
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
ICIDS
2009
Springer
15 years 10 months ago
Bridging Media with the Help of Players
We suggest harvesting the power of multiplayer design to bridge content across different media platforms and develop player-driven cross-media experiences. This paper first argues ...
Michael Nitsche, Matthew Drake, Janet Murray
ISEUD
2009
Springer
15 years 10 months ago
End-User Development of Enterprise Widgets
Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Michael Spahn, Volker Wulf
ISW
2009
Springer
15 years 10 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...