Sciweavers

89 search results - page 9 / 18
» Should recognizers have ears
Sort
View
118
Voted
SECON
2008
IEEE
15 years 10 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
HICSS
2007
IEEE
131views Biometrics» more  HICSS 2007»
15 years 10 months ago
Characterizing Genres of Web Pages: Genre Hybridism and Individualization
When dealing with genres of web pages, there are two important aspects to be taken into account. On the one hand, the web is fluid, unstable and fast-paced. On the other hand, gen...
Marina Santini
IEEECIT
2007
IEEE
15 years 10 months ago
The Value Gap Model: Value-Based Requirements Elicitation
The User requirements of many web-based services are dynamically and continuously changing even during the service time itself. For that reason, web service companies always keep ...
Sang Won Lim, Taek Lee, Sangsoo Kim, Hoh Peter In
HICSS
2007
IEEE
134views Biometrics» more  HICSS 2007»
15 years 10 months ago
Modeling Enablers for Successful KM Implementation
Knowledge is recognized as a critical resource to gain and sustain competitive advantage in business. While many organizations are employing knowledge management (KM) initiatives,...
Vittal S. Anantatmula, Shivraj Kanungo
UIC
2007
Springer
15 years 10 months ago
Context-Aware Service Composition for Mobile Network Environments
Recent advances in wireless and mobile networking technology pose a new set of requirements and challenges that are not previously thought of, when it comes to smart space middlewa...
Choonhwa Lee, Sunghoon Ko, Seungjae Lee, Wonjun Le...