Sciweavers

1092 search results - page 112 / 219
» Understanding Context Before Using It
Sort
View
MHCI
2009
Springer
14 years 12 days ago
Minimizing mobile phone disruption via smart profile management
In this paper, we describe the Smart Profile Management application that was designed to help minimize mobile phone disruptions. The system does this by making phone profile chang...
Amnon Dekel, Dan Nacht, Scott Kirkpatrick
AIIA
2001
Springer
14 years 11 days ago
Evaluation Methods for Focused Crawling
The exponential growth of documents available in the World Wide Web makes it increasingly difficult to discover relevant information on a specific topic. In this context, growing ...
Andrea Passerini, Paolo Frasconi, Giovanni Soda
FC
2001
Springer
97views Cryptology» more  FC 2001»
14 years 10 days ago
Monotone Signatures
In many real-life situations, massive quantities of signatures have to be issued on cheap passive supports (e.g. paper-based) such as bank-notes, badges, ID cards, driving licenses...
David Naccache, David Pointcheval, Christophe Tyme...
ACSAC
2000
IEEE
14 years 8 days ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
AC
1999
Springer
14 years 4 days ago
Enhancing Replica Management Services to Cope with Group Failures
In a distributed system, replication of components, such as objects, is a well known way of achieving availability. For increased availability, crashed and disconnected components...
Paul D. Ezhilchelvan, Santosh K. Shrivastava