Sciweavers

2268 search results - page 43 / 454
» The Essence of Form Abstraction
Sort
View
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
MHCI
2005
Springer
14 years 1 months ago
Telelogs: a social communication space for urban environments
This paper presents a novel idea for a system known as Telelogs. Utilizing the ubiquity of mobile devices, Telelogs functions as a service by which individuals in an urban environ...
Brian Davis, Karrie Karahalios
VLDB
2004
ACM
106views Database» more  VLDB 2004»
14 years 1 months ago
Structures, Semantics and Statistics
At a fundamental level, the key challenge in data integration is to reconcile the semantics of disparate data sets, each expressed with a different database structure. I argue th...
Alon Y. Halevy
WICON
2008
13 years 9 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
AC
2004
Springer
13 years 8 months ago
The Timeboxing process model for iterative software development
In today's business where speed is of essence, an iterative development approach that allows the functionality to be delivered in parts has become a necessity and an effectiv...
Pankaj Jalote, Aveejeet Palit, Priya Kurien