Sciweavers

6137 search results - page 1089 / 1228
» Securing Collaborative Applications
Sort
View
DLOG
2011
13 years 13 days ago
Analysing Multiple Versions of an Ontology: A Study of the NCI Thesaurus
The detection of changes between OWL ontologies is an important service for ontology engineering. There are several approaches to this problem, both syntactic and semantic. A purel...
Rafael S. Gonçalves, Bijan Parsia, Ulrike S...
ICDE
2011
IEEE
224views Database» more  ICDE 2011»
13 years 11 days ago
SmartTrace: Finding similar trajectories in smartphone networks without disclosing the traces
—In this demonstration paper, we present a powerful distributed framework for finding similar trajectories in a smartphone network, without disclosing the traces of participatin...
Costandinos Costa, Christos Laoudias, Demetrios Ze...
JCAL
2011
89views more  JCAL 2011»
12 years 11 months ago
What if undergraduate students designed their own web learning environment? Exploring students' web 2.0 mentality through partic
Following the increasing calls for a more skeptical analysis of web 2.0 and the empowerment of learners’ voices in formulating upcoming technologies, this paper elaborates on the...
George Palaigeorgiou, George Triantafyllakos, Avgo...
MOBIHOC
2012
ACM
11 years 11 months ago
Serendipity: enabling remote computing among intermittently connected mobile devices
Mobile devices are increasingly being relied on for services that go beyond simple connectivity and require more complex processing. Fortunately, a mobile device encounters, possi...
Cong Shi, Vasileios Lakafosis, Mostafa H. Ammar, E...
DAC
2007
ACM
14 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
« Prev « First page 1089 / 1228 Last » Next »