Sciweavers

1567 search results - page 118 / 314
» Research Issues in Ubiquitous Computing
Sort
View
COGSCI
2008
139views more  COGSCI 2008»
13 years 9 months ago
A Computational Model of Early Argument Structure Acquisition
How children go about learning the general regularities that govern language, as well as keeping track of the exceptions to them, remains one of the challenging open questions in ...
Afra Alishahi, Suzanne Stevenson
JUCS
2010
114views more  JUCS 2010»
13 years 3 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
CCS
2006
ACM
14 years 24 days ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
KER
2008
107views more  KER 2008»
13 years 9 months ago
Tuplespace-based computing for the Semantic Web: a survey of the state-of-the-art
Semantic technologies promise to solve many challenging problems of the present Web applications. As they achieve a feasible level of maturity, they become increasingly accepted i...
Lyndon J. B. Nixon, Elena Paslaru Bontas Simperl, ...
JSS
2000
123views more  JSS 2000»
13 years 8 months ago
Approaches for broadcasting temporal data in mobile computing systems
Rapid advances in mobile communication technology have spawned many new mobile applications. A key element in many of these systems is the need to distribute real-time information...
Kam-yiu Lam, Edward Chan, Joe Chun-Hung Yuen