Sciweavers

13913 search results - page 2640 / 2783
» models 2007
Sort
View
JCIT
2007
132views more  JCIT 2007»
13 years 4 months ago
Analysis and Implementation of M-commerce in Education for Developing Countries (Uzbekistan case)
M-commerce is one of the ways IT can significantly contribute to boosting economy of the developing countries. M-commerce project has a high potential in the developing countries ...
Olga Yugay, Aleksey Semyonov, Il Seok Ko, Sarvar R...
JCP
2007
117views more  JCP 2007»
13 years 4 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
JFR
2007
144views more  JFR 2007»
13 years 4 months ago
Real-Time SLAM with Octree Evidence Grids for Exploration in Underwater Tunnels
We describe a Simultaneous Localization and Mapping (SLAM) method for a hovering underwater vehicle that will explore underwater caves and tunnels, a true three dimensional (3D) e...
Nathaniel Fairfield, George Kantor, David Wettergr...
JNCA
2007
125views more  JNCA 2007»
13 years 4 months ago
Distributed middleware architectures for scalable media services
The fusion of Multimedia and Internet technology has introduced an ever-increasing demand for large-scale reliable media services. This exposes the scalability limitations of curr...
Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimi...
JOC
2007
133views more  JOC 2007»
13 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
« Prev « First page 2640 / 2783 Last » Next »