Sciweavers

13224 search results - page 34 / 2645
» Self-monitoring for Computer Users
Sort
View
PERCOM
2004
ACM
14 years 9 months ago
A User-Guided Cognitive Agent for Network Service Selection in Pervasive Computing Environments
Connectivity is central to pervasive computing environments. We seek to catalyze a world of rich and diverse connectivity through technologies that drastically simplify the task o...
George Lee, Peyman Faratin, Steven Bauer, John Wro...
AH
2004
Springer
14 years 3 months ago
Recent Soft Computing Approaches to User Modeling in Adaptive Hypermedia
Abstract. The ability of an adaptive hypermedia system to create tailored environments depends mainly on the amount and accuracy of information stored in each user model. One of th...
Enrique Frías-Martínez, George D. Ma...
SOCO
2005
Springer
14 years 3 months ago
Ad Hoc Composition of User Tasks in Pervasive Computing Environments
Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in...
Sonia Ben Mokhtar, Nikolaos Georgantas, Valé...
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 9 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 9 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo