Sciweavers

255 search results - page 19 / 51
» Principles for Entity Authentication
Sort
View
FOIS
2008
13 years 8 months ago
Artefacts and Roles: Modelling Strategies in a Multiplicative Ontology
The purpose of this paper is to examine different modelling strategies available in a multiplicative formal ontology, and the principles that drive their choice. This study is base...
Laure Vieu, Stefano Borgo, Claudio Masolo
ICHIM
2001
68views more  ICHIM 2001»
13 years 8 months ago
Electronic Guidebooks and Visitor Attention
We describe an electronic guidebook prototype and report on a study of its use in a historic house. Supported by mechanisms in the guidebook, visitors constructed experiences that...
Allison Woodruff, Paul M. Aoki, Amy Hurst, Margare...
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
ESAW
2005
Springer
14 years 28 days ago
Collaborative Agent Tuning: Performance Enhancement on Mobile Devices
Ambient intelligence envisages a world saturated with sensors and other embedded computing technologies, operating transparently, and accessible to all in a seamless and intuitive ...
Conor Muldoon, Gregory M. P. O'Hare, Michael J. O'...
EACL
2009
ACL Anthology
13 years 5 months ago
Discovering Global Patterns in Linguistic Networks through Spectral Analysis: A Case Study of the Consonant Inventories
Recent research has shown that language and the socio-cognitive phenomena associated with it can be aptly modeled and visualized through networks of linguistic entities. However, ...
Animesh Mukherjee, Monojit Choudhury, Ravi Kannan