One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K
to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
In this paper we describe techniques for the discovery and construction of user profiles. Leveraging from the emergent data web, our system addresses the problem of sparseness of ...
Abstract. This poster presents a novel way to represent user navigation in XML retrieval using collection statistics from XML summaries. Currently, developing user navigation model...
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user...
Ubiquitous computing requires a multitude of devices to have access ame services. Abstract specifications of user interfaces are designed to separate the definition of a user inter...