Sciweavers

108 search results - page 17 / 22
» Why Is this User Asking so Many Questions
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
KI
2002
Springer
13 years 7 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
ACMDIS
2006
ACM
14 years 1 months ago
External representations in ubiquitous computing design and the implications for design tools
One challenge for ubiquitous computing is providing appropriate tools for professional designers, thus leading to stronger user-valued applications. Unlike many previous tool-buil...
Steven Dow, T. Scott Saponas, Yang Li, James A. La...
MOBICOM
2010
ACM
13 years 8 months ago
Indoor localization without the pain
While WiFi-based indoor localization is attractive, the need for a significant degree of pre-deployment effort is a key challenge. In this paper, we ask the question: can we perfo...
Krishna Chintalapudi, Anand Padmanabha Iyer, Venka...
INTERNET
2007
182views more  INTERNET 2007»
13 years 7 months ago
Analysis of Caching and Replication Strategies for Web Applications
Replication and caching mechanisms are often employed to enhance the performance of Web applications. In this article, we present a qualitative and quantitative analysis of state-...
Swaminathan Sivasubramanian, Guillaume Pierre, Maa...