Sciweavers

1172 search results - page 165 / 235
» Who killed design
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
MASCOTS
2008
13 years 11 months ago
Finding Good Configurations in High-Dimensional Spaces: Doing More with Less
Manually tuning tens to hundreds of configuration parameters in a complex software system like a database or an application server is an arduous task. Recent work has looked into ...
Risi Thonangi, Vamsidhar Thummala, Shivnath Babu
OWLED
2007
13 years 11 months ago
Lege Feliciter: Using Structured English to represent a Topographic Hydrology Ontology
: The mathematical nature of description logics has meant that domain experts find it hard to understand. This forms a significant impediment to the creation and adoption of ontolo...
Glen Hart, Catherine Dolbear, John Goodwin
AVI
2004
13 years 11 months ago
Scaffolding visually cluttered web pages to facilitate accessibility
Increasingly, rich and dynamic content and abundant links are making Web pages visually cluttered and widening the accessibility divide for the disabled and people with impairment...
Alison Lee
CSREAEEE
2006
138views Business» more  CSREAEEE 2006»
13 years 11 months ago
An English-Chinese Learning System Using J2ME and Java Servlets
Mobile phones offer a variety of interesting and exciting applications. A mobile phone can be a communication device, an entertainment device, and a learning device. J2ME is a pop...
Chin-Chih Chang, Swapna Sunkara