Sciweavers

ICCSA
2007
Springer
14 years 3 months ago
FRASH: Hierarchical File System for FRAM and Flash
Abstract. In this work, we develop novel file system, FRASH, for byteaddressable NVRAM (FRAM[1]) and NAND Flash device. Byte addressable NVRAM and NAND Flash is typified by the DRA...
Eun-ki Kim, Hyungjong Shin, Byung-gil Jeon, Seokhe...
ICCSA
2007
Springer
14 years 3 months ago
ontoX - A Method for Ontology-Driven Information Extraction
Information Extraction (IE) is an important research field within the Artificial Intelligence community, for it tries to extract relevant information out of vast amounts of data....
Burcu Yildiz, Silvia Miksch
ICCSA
2007
Springer
14 years 3 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
ICCSA
2007
Springer
14 years 3 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
ICCSA
2007
Springer
14 years 3 months ago
Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks
In this paper we address the problem of working paths optimization in survivable MPLS network. We focus on an existing facility network, in which only network flows can be optimize...
Michal Przewozniczek, Krzysztof Walkowiak
HUC
2007
Springer
14 years 3 months ago
Cooperative Augmentation of Smart Objects with Projector-Camera Systems
In this paper we present a new approach for cooperation between mobile smart objects and projector-camera systems to enable augmentation of the surface of objects with interactive ...
David Molyneaux, Hans Gellersen, Gerd Kortuem, Ber...
HUC
2007
Springer
14 years 3 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
HUC
2007
Springer
14 years 3 months ago
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM
We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on I...
Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. ...
HUC
2007
Springer
14 years 3 months ago
An Empirical Study of the Potential for Context-Aware Power Management
Context-aware power management (CAPM) uses context (e.g., user location) likely to be available in future ubiquitous computing environments, to effectively power manage a building...
Colin Harris, Vinny Cahill