Sciweavers

223 search results - page 34 / 45
» The use of an intelligent prompting system for people with d...
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
SSR
2001
104views more  SSR 2001»
13 years 9 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
HT
1997
ACM
13 years 11 months ago
Supporting User-defined Activity Spaces
Activity spaces are usually task-specific and only common to a group of people who work together in a certain application domain. It is desirable to enable users to define and mod...
Weigang Wang, Jörg M. Haake
KI
2008
Springer
13 years 7 months ago
Modeling Ontological Concepts of Motions with Two Projection-Based Spatial Models
To model human concepts of motions is essential for the development of the systems and machines that collaborate with ordinary people on spatiodynamic tasks. This paper applies two...
Hui Shi, Yohei Kurata
EMSOFT
2001
Springer
14 years 8 days ago
Some Synchronization Issues When Designing Embedded Systems from Components
Abstract This paper is sort of a confession. Issues of synchrony, asynchrony, and synchronization, arise frequently in designing embedded systems from components, like everyone I k...
Albert Benveniste