-
1
-
-
33750014277
-
Profile driven data management
-
August
-
M. Chcrniak, E. Galvez, D. Brooks, M. Franklin, and S. Zdonik, Profile Driven Data Management, in 28th International Conference on Very Large Databases, August 2002.
-
(2002)
28th International Conference on Very Large Databases
-
-
Chcrniak, M.1
Galvez, E.2
Brooks, D.3
Franklin, M.4
Zdonik, S.5
-
2
-
-
23044532467
-
Profile driven data management for pervasive environments
-
Aix en Provence, France, September
-
F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y Yesha, Profile driven data management for pervasive environments, in 13th International Conference on Database and Expert Systems Applications (DEXA 2002), Aix en Provence, France, September 2002.
-
(2002)
13th International Conference on Database and Expert Systems Applications (DEXA 2002)
-
-
Perich, F.1
Avancha, S.2
Chakraborty, D.3
Joshi, A.4
Yesha, Y.5
-
5
-
-
3042640767
-
On data management in pervasive computing environments
-
F. Perich, A. Joshi, T. Finin, and Y. Yesha, On data management in pervasive computing environments, IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 5, pp. 621-634, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.5
, pp. 621-634
-
-
Perich, F.1
Joshi, A.2
Finin, T.3
Yesha, Y.4
-
9
-
-
19944395899
-
Propagation of trust and distrust
-
ACM Press, New York, NY, USA
-
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of trust and distrust, in WWW '04: Proceedings of the 13th international conference on World Wide Web, ACM Press, New York, NY, USA, pp. 403-412, 2004.
-
(2004)
WWW '04: Proceedings of the 13th International Conference on World Wide Web
, pp. 403-412
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
10
-
-
84880467894
-
The cigcntrust algorithm for reputation management in p2p networks
-
ACM Press, New York, NY, USA
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The cigcntrust algorithm for reputation management in p2p networks, in WWW '03: Proceedings of the 12th international conference on World Wide. Web, ACM Press, New York, NY, USA, pp. 640-651, 2003.
-
(2003)
WWW '03: Proceedings of the 12th International Conference on World Wide. Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
12
-
-
24944503332
-
Challenges in ubiquitous data management
-
Springer-Verlag
-
M. J. Franklin. Challenges in ubiquitous data management, in Informatics-10 Years Back. 10 Years Ahead., Springer-Verlag, pp. 24-33, 2001.
-
(2001)
Informatics-10 Years Back. 10 Years Ahead
, pp. 24-33
-
-
Franklin, M.J.1
-
13
-
-
0035428327
-
Expressing user profiles for data recharging
-
M. Chcrniack, M. J. Franklin, and S. Zdonik. Expressing user profiles for data recharging, IEEE Personal Communications, Vol. 8, No. 4, pp. 32-38, 2001.
-
(2001)
IEEE Personal Communications
, vol.8
, Issue.4
, pp. 32-38
-
-
Chcrniack, M.1
Franklin, M.J.2
Zdonik, S.3
-
17
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
ACM Press
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, in Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, ACM Press, pp. 149-160, 2001.
-
(2001)
Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
18
-
-
0037660949
-
Work rhythms: Analyzing visualizations of awareness histories of distributed groups
-
ACM Press
-
J. B. Begole, J. C. Tang, R. B. Smith, and N. Yankelovich, Work rhythms: analyzing visualizations of awareness histories of distributed groups, in CSCW '02: Proceedings of the 2002 ACM conference on Computer supported cooperative work, ACM Press, pp. 334-343, 2002.
-
(2002)
CSCW '02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work
, pp. 334-343
-
-
Begole, J.B.1
Tang, J.C.2
Smith, R.B.3
Yankelovich, N.4
-
19
-
-
0035791053
-
Securing context-aware applications using environment roles
-
ACM Press
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd, Securing context-aware applications using environment roles, in SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, ACM Press, pp. 10-20, 2001.
-
(2001)
SACMAT '01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
22
-
-
78651561296
-
Exploiting space and location as a design framework for interactive mobile systems
-
A. Dix, T. Rodden, N. Davies, J. Trevor, A. Friday, and K. Palfreyman, Exploiting space and location as a design framework for interactive mobile systems, ACM Transaction Computational-Human Interaction, Vol. 7, No. 3, pp. 285-321, 2000.
-
(2000)
ACM Transaction Computational-human Interaction
, vol.7
, Issue.3
, pp. 285-321
-
-
Dix, A.1
Rodden, T.2
Davies, N.3
Trevor, J.4
Friday, A.5
Palfreyman, K.6
-
23
-
-
78649686479
-
Location aware resource management in smart homes
-
A. Roy, S. K. Das Bhaumik, A. Bhattacharya, K. Basu, D. J. Cook, and S. K. Das, Location aware resource management in smart homes, in Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp. 481-488, 2003.
-
(2003)
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
, pp. 481-488
-
-
Roy, A.1
Das Bhaumik, S.K.2
Bhattacharya, A.3
Basu, K.4
Cook, D.J.5
Das, S.K.6
-
24
-
-
13244299169
-
In reputation we believe: Query processing in mobile ad-hoc networks
-
Boston, MA, August
-
F. Perich, J. L. Undercoffer, L. Kagal, A. Joshi, T. Finin, and Y Yesha, In reputation we believe: query processing in mobile ad-hoc networks, in International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, August 2004.
-
(2004)
International Conference on Mobile and Ubiquitous Systems: Networking and Services
-
-
Perich, F.1
Undercoffer, J.L.2
Kagal, L.3
Joshi, A.4
Finin, T.5
Yesha, Y.6
-
25
-
-
84947273682
-
The Sybil attack
-
J. R. Douceur, The Sybil attack, in IPTPS, pp. 251-260, 2002.
-
(2002)
IPTPS
, pp. 251-260
-
-
Douceur, J.R.1
-
27
-
-
33749996470
-
-
February
-
Web Ontology Language (OWL) http://www.w3.org/2004/OWL/, February 2005.
-
(2005)
-
-
|