Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Accelerating Assessment with Self-Optimizing Devices

    Self-optimizing devices are able to adapt themselves to meet their user’s needs. This paper presents the Keyboard Optimizer, a self-optimizer for keyboards, and examines its potential within the professional a...

    Shari Trewin, Patti Slobogin, M. G. Power in Computers Hel** People with Special Needs (2002)

  2. Chapter and Conference Paper

    Capabilities: Describing What Services Can Do

    The ability of agents and services to automatically locate and interact with unknown partners is a goal for both the semantic web and web services. This, “serendipitous interoperability”, is hindered by the la...

    Phillipa Oaks, Arthur H. M. ter Hofstede in Service-Oriented Computing - ICSOC 2003 (2003)

  3. No Access

    Chapter and Conference Paper

    Ontology Map** in Pervasive Computing Environment

    Ontology provides a formal, explicit specification of a shared conceptualization of a domain. It enables knowledge sharing in open and dynamic distributed systems. Using ontology, devices can understand the me...

    C. Y. Kong, C. L. Wang, F. C. M. Lau in Embedded and Ubiquitous Computing (2004)

  4. No Access

    Chapter and Conference Paper

    An Agent-Based Compositional Framework

    Web services requirements for means of automating the coordination of distributed heterogeneous applications have been addressed by a two-pronged initiative. One has been driven by process management technolog...

    R. Anane, Y. Li, C -F Tsai, K -M Chao in Web Technologies Research and Development … (2005)

  5. No Access

    Chapter and Conference Paper

    Semantic Sensor Net: An Extensible Framework

    Existing approaches for sensor networks suffer from a number of critical drawbacks. First, homogeneous deployments have been commonly assumed, but in practice multiple deployments of sensor nets and heterogene...

    Lionel M. Ni, Yanmin Zhu, Jian Ma, Minglu Li, Qiong Luo in Networking and Mobile Computing (2005)

  6. Chapter and Conference Paper

    Hand Geometry Based Recognition with a MLP Classifier

    This paper presents a biometric recognition system based on hand geometry. We describe a database specially collected for research purposes, which consists of 50 people and 10 different acquisitions of the rig...

    Marcos Faundez-Zanuy, Miguel A. Ferrer-Ballester in Advances in Biometrics (2005)

  7. Chapter and Conference Paper

    Generic Construction of (Identity-Based) Perfect Concurrent Signatures

    The notion of concurrent signatures was recently introduced by Chen, Kudla and Paterson. In concurrent signature schemes, two entities can produce two signatures that are not binding, until an extra piece of info...

    Sherman S. M. Chow, Willy Susilo in Information and Communications Security (2005)

  8. No Access

    Chapter and Conference Paper

    Short Linkable Ring Signatures Revisited

    Ring signature is a group-oriented signature in which the signer can spontaneously form a group and generate a signature such that the verifier is convinced the signature was generated by one member of the gro...

    Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang in Public Key Infrastructure (2006)

  9. No Access

    Chapter and Conference Paper

    A Classification, Based on ICF, for Modelling Human Computer Interaction

    The present paper describes a study on the use of the International Classification of Functioning Disability and Health (ICF) of the World Health Organization (WHO) for modelling the interaction between humans...

    M. Billi, L. Burzagli, P. L. Emiliani in Computers Hel** People with Special Needs (2006)

  10. No Access

    Chapter and Conference Paper

    Identity-Based Strong Multi-Designated Verifiers Signatures

    Designated verifier signatures are privacy-oriented signatures that provide message authenticity only to a specified verifier but nobody else. We consider strong multi-designated verifiers such that knowledge ...

    Sherman S. M. Chow in Public Key Infrastructure (2006)

  11. No Access

    Chapter and Conference Paper

    Context-Aware Dynamic Personalised Service Re-composition in a Pervasive Service Environment

    A pervasive environment needs to take account of a user’s context and preferences in determining which services to provide to the user. Moreover, one of the important features of a pervasive service environmen...

    Yu** Yang, Fiona Mahon, M. Howard Williams in Ubiquitous Intelligence and Computing (2006)

  12. No Access

    Chapter and Conference Paper

    A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases

    In the presence of dirty data, a search for specific information by a standard query (e.g., search for a name that is misspelled or mistyped) does not return all needed information. This is an issue of grave i...

    Olcay Kursun, Anna Koufakou, Bing Chen in Intelligence and Security Informatics (2006)

  13. No Access

    Chapter and Conference Paper

    Batch Pairing Delegation

    Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as when the computing devices are resource-c...

    Patrick P. Tsang, Sherman S. M. Chow in Advances in Information and Computer Secur… (2007)

  14. No Access

    Chapter and Conference Paper

    Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments

    Domestic technologies have been a popular area of study for ubiquitous computing researchers, however there is relatively little recent data on how families currently use and share technologies in domestic env...

    A. J. Bernheim Brush, Kori M. Inkpen in UbiComp 2007: Ubiquitous Computing (2007)

  15. No Access

    Chapter and Conference Paper

    Design for All in the Ambient Intelligence Environment

    An Information Society described by the Ambient Intelligence (AmI) paradigm is emerging, due to the ongoing technological developments. The paper aims to show that a designed for all AmI environment can have a...

    P. L. Emiliani, M. Billi, L. Burzagli in Computers Hel** People with Special Needs (2008)

  16. No Access

    Chapter and Conference Paper

    Measuring and Comparing the Adoption of Software Process Practices in the Software Product Industry

    Compatibility of agile methods and CMMI have been of interest for the software engineering community, but empirical evidence beyond case studies is scarce, which be attributed to the lack of validated measurem...

    Mikko Rönkkö, Antero Järvi, Markus M. Mäkelä in Making Globally Distributed Software Devel… (2008)

  17. No Access

    Chapter and Conference Paper

    Penetration Testing of OPC as Part of Process Control Systems

    We have performed penetration testing on OPC, which is a central component in process control systems on oil installations. We have shown how a malicious user with different privileges – outside the network, a...

    Maria B. Line, Martin Gilje Jaatun, Zi Bin Cheah in Ubiquitous Intelligence and Computing (2008)

  18. No Access

    Chapter and Conference Paper

    Noise Detection in Agent Reputation Models Using IMM Filtering

    Inferring Trust in dynamic and subjective environments is a key interesting issue in the way to obtain a complete delegation of human-like decisions in autonomous agents. With this final intention several trus...

    Javier Carbo, Jesus Garcia, Jose M. Molina in Trust in Agent Societies (2008)

  19. No Access

    Chapter and Conference Paper

    University and Primary Schools Cooperation for Small Robots Programming

    In July 2007, in the Italian northwest region named Piedmont, a number of teachers and school headmasters created a School-Net for k-12 "Educational use of robotics". The School-Net aims at promoting Papert’s ...

    G. Barbara Demo, Simonetta Siega in Visioning and Engineering the Knowledge So… (2009)

  20. No Access

    Chapter and Conference Paper

    The Impact of Positive Electronic Word-of-Mouth on Consumer Online Purchasing Decision

    Despite the extensive use of online reputational mechanism such as products reviews forum to promote trust and purchase decisions, there has been little empirical evidence to support the notion that positive w...

    Christy M. K. Cheung, Matthew K. O. Lee in Visioning and Engineering the Knowledge So… (2009)

previous disabled Page of 4