Sciweavers

608 search results - page 116 / 122
» Self-healing for Pervasive Computing Systems
Sort
View
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
13 years 10 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
HUC
2009
Springer
13 years 10 months ago
Validated caloric expenditure estimation using a single body-worn sensor
In 2007, approximately 30% of US adults were obese, with related health care costs exceeding 100 billion dollars. Clearly, the obesity epidemic represents a growing societal conce...
Jonathan Lester, Carl Hartung, Laura Pina, Ryan Li...
AI
2006
Springer
13 years 6 months ago
Generating and evaluating evaluative arguments
Evaluative arguments are pervasive in natural human communication. In countless situations people attempt to advise or persuade their interlocutors that something is desirable (vs...
Giuseppe Carenini, Johanna D. Moore
IJESMA
2010
136views more  IJESMA 2010»
13 years 4 months ago
Understanding Shared Services: An Exploration of the IS Literature
In a competitive environment, companies continuously innovate to offer superior services at lower costs. `Shared services' have been extensively adopted in practice as one me...
Suraya Miskon, Wasana Bandara, Erwin Fielt, Guy G....
ICCSA
2005
Springer
14 years 7 days ago
Reflective Middleware for Location-Aware Application Adaptation
Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...