Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
— This paper presents a concept that enables consumers to access and share product recommendations using their mobile phone. Based on a review of current product recommendation m...
Felix von Reischach, Florian Michahelles, Dominiqu...
Electronic commerce technology offers the opportunity to integrate and optimize the global production and distribution on supply chain. Computers of various corporations, located t...
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...