Sciweavers

1075 search results - page 11 / 215
» User's issues in crossmedia applications
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 7 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
PERCOM
2006
ACM
14 years 7 months ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen
ICPADS
2005
IEEE
14 years 1 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
CCGRID
2006
IEEE
14 years 1 months ago
An Overview of Security Issues in Cluster Interconnects
— Widespread use of cluster systems in diverse set of applications has spurred significant interest in providing high performance cluster interconnects. A major inefficiency in...
Manhee Lee, Eun Jung Kim, Ki Hwan Yum, Mazin S. Yo...
EWCBR
2004
Springer
14 years 1 months ago
Explanations and Case-Based Reasoning: Foundational Issues
By design, Case-Based Reasoning (CBR) systems do not need deep general knowledge. In contrast to (rule-based) expert systems, CBR systems can already be used with just some initial...
Thomas Roth-Berghofer