Sciweavers

1697 search results - page 338 / 340
» Social-Networks Connect Services
Sort
View
IEEEARES
2010
IEEE
13 years 7 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
SENSYS
2010
ACM
13 years 7 months ago
SensLoc: sensing everyday places and paths using less energy
Continuously understanding a user's location context in colloquial terms and the paths that connect the locations unlocks many opportunities for emerging applications. While ...
Donnie H. Kim, Younghun Kim, Deborah Estrin, Mani ...
GI
2009
Springer
13 years 7 months ago
Component Governance as a Key Factor for IT Business Alignment of Telecommunications Companies
Abstract: Modern telecommunications companies currently undergo remarkable structural changes to be successful in the Next-Generation markets for communications and content product...
Sebastian Reinisch, Uwe Beyer, Robert Mertens
EJWCN
2010
118views more  EJWCN 2010»
13 years 4 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
ESWS
2011
Springer
13 years 1 months ago
DataFinland - A Semantic Portal for Open and Linked Datasets
The number of open datasets available on the web is increasing rapidly with the rise of the Linked Open Data (LOD) cloud and various governmental efforts for releasing public data ...
Matias Frosterus, Eero Hyvönen, Joonas Laitio