Sciweavers

622 search results - page 123 / 125
» User Profiles for Personalized Information Access
Sort
View
IDMS
1997
Springer
188views Multimedia» more  IDMS 1997»
13 years 11 months ago
An Approach for an Adaptive Visualization in a Mobile Environment
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Luc Neumann, Alberto Barbosa Raposo
SOSP
2003
ACM
14 years 4 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
EDBTW
2010
Springer
14 years 2 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
ACMDIS
2006
ACM
14 years 1 months ago
Design research for a context-aware capture system to support biology education
Automatic capture technology could enable students to record and index much information—both digital and nondigital—with little extra effort. Can this technology be designed t...
Abe Crystal
SEMWEB
2001
Springer
14 years 3 days ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...