Sciweavers

59 search results - page 2 / 12
» jsw 2008
Sort
View
JSW
2008
93views more  JSW 2008»
13 years 4 months ago
The Effect of Mobile Phone Screen Size on Video Based Learning
- This paper investigates the effect of mobile
Nipan Maniar, Emily Bennett, Steve Hand, George Al...
JSW
2008
121views more  JSW 2008»
13 years 4 months ago
The Comparison of WML, cHTML, and XHTML-MP in m-Commerce
In order to use mobile devices for business application, mobile applications and standard have grown fast
Jongwook Woo, MinSeok Jang
JSW
2008
118views more  JSW 2008»
13 years 4 months ago
Deciding the Correctness of Attacks on Authentication Protocols
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
Anders Moen Hagalisletto
JSW
2008
110views more  JSW 2008»
13 years 4 months ago
An Open Approach for the Applied Pi Calculus
A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends -calculus in order to facilitate analyzing security protocols. Our notion is based on the label...
Han Zhu, Yonggen Gu, Xiaohong Wu
JSW
2008
94views more  JSW 2008»
13 years 4 months ago
Thresholding Images of Historical Documents Using a Tsallis-Entropy Based Algorithm
In this paper we present an algorithm for thresholding images of historical documents. The main objective is to generate high quality monochromatic images in order to make them eas...
Carlos A. B. Mello, Luciana A. Schuler