Sciweavers

61 search results - page 10 / 13
» Towards designing better map interfaces for the mobile: expe...
Sort
View
TMC
2008
159views more  TMC 2008»
13 years 5 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
CHI
2004
ACM
14 years 7 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
ICWE
2011
Springer
12 years 10 months ago
Formal Modeling of RESTful Systems Using Finite-State Machines
Representational State Transfer (REST), as an architectural style for distributed hypermedia systems, enables scalable operation of the World Wide Web (WWW) and is the foundation f...
Ivan Zuzak, Ivan Budiselic, Goran Delac
EUROSYS
2007
ACM
14 years 4 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso
FCCM
2004
IEEE
118views VLSI» more  FCCM 2004»
13 years 10 months ago
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor
Reconfigurable System-on-Chip (SoC) platforms that incorporate hard-core processors surrounded by large amounts of FPGA are today commodities: the reconfigurable logic is often us...
Miljan Vuletic, Laura Pozzi, Paolo Ienne