Sciweavers

2650 search results - page 37 / 530
» Personalization in E-Commerce Applications
Sort
View
CARDIS
1998
Springer
103views Hardware» more  CARDIS 1998»
13 years 12 months ago
Secure Personalization Using Proxy Cryptography
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
Pierre Girard
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Personal AP Protocol for Mobility Management in IEEE 802.11 Systems
—In mobile wireless systems, the quest to support delay-stringent multimedia applications challenges most existing solutions to the mobility support and traffic management proble...
Lei Zan, Jidong Wang, Lichun Bao
ACMSE
2007
ACM
13 years 11 months ago
Semi-transparent video interfaces to assist deaf persons in meetings
Meetings are a vital part of participation in social activities. For a deaf person who does not understand spoken language, following a discourse at meetings can become confusing ...
Dorian Miller, Karl Gyllstrom, P. David Stotts, Ja...
IJIM
2008
124views more  IJIM 2008»
13 years 7 months ago
Personalization and User Profile Management
Personalization and effective user profile management will be critical to meet the individual users' needs and for achieving eInclusion and eAccessibility. This paper outlines...
Françoise Petersen, Giovanni Bartolomeo, Mi...
RTCSA
2005
IEEE
14 years 1 months ago
Citron: A Context Information Acquisition Framework for Personal Devices
This paper describes a context information acquisition framework for a personal device that equips a variety of sensors. The framework captures context information about a user an...
Tetsuo Yamabe, Ayako Takagi, Tatsuo Nakajima