Sciweavers

95 search results - page 14 / 19
» Towards Recognizing Abstract Activities: An Unsupervised App...
Sort
View
IPOM
2009
Springer
14 years 4 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
ICDCSW
2008
IEEE
14 years 4 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
DCOSS
2010
Springer
14 years 2 months ago
Programming Sensor Networks Using Remora Component Model
Abstract. The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree...
Amirhosein Taherkordi, Frédéric Loir...
BIS
2008
114views Business» more  BIS 2008»
13 years 11 months ago
Transforming Exchange-based Job Boards into Lasting Career Communities
Abstract. In this paper, we use a qualitative approach to explore which design aspects an erecruiting platform requires so as to achieve active long-term participation of its users...
Elfi Ettinger, Celeste Wilderom, Rolf Van Dick
ACISP
2006
Springer
14 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros