Sciweavers

1834 search results - page 304 / 367
» Public Key Cryptography
Sort
View
SEMWEB
2009
Springer
14 years 2 months ago
Actively Learning Ontology Matching via User Interaction
Ontology matching plays a key role for semantic interoperability. Many methods have been proposed for automatically finding the alignment between heterogeneous ontologies. However...
Feng Shi, Juanzi Li, Jie Tang, Guo Tong Xie, Hanyu...
SIGUCCS
2009
ACM
14 years 2 months ago
Getting iTunes U at Ithaca College up and running!
iTunes U is a free service from Apple that allows for the easy organization and distribution of content through iTunes. In the spring of 2008, Ithaca College signed a contract wit...
Beth M. Rugg
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
ScreenSpot resource discovery for smart spaces and mobilevue media sharing application
This paper documents the demonstration showcasing the ScreenSpot resource discovery framework and the MobileVue social media sharing application. The key points of the demonstrati...
Marko Jurmu, Sebastian Boring, Jukka Riekki
NDSS
2008
IEEE
14 years 2 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
DSN
2007
IEEE
14 years 2 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...