Sciweavers

Share
JDCTA
2010
118views more  JDCTA 2010»
8 years 1 months ago
Shoppers' Experiences of Digital Signage-a Cross-National Qualitative Study
Digital signage, sometimes known as a Digital Communications Network (DCN) or private plasma screen network, has been little researched to date. This paper puts forward the view t...
Andrew Newman, Charles Dennis, Len-Tiu Wright, Tam...
JDCTA
2010
117views more  JDCTA 2010»
8 years 1 months ago
Content Based Web Sampling
Yini Bao, Erwin M. Bakker
JDCTA
2010
152views more  JDCTA 2010»
8 years 1 months ago
Robust and Geometric Invariant Watermarking Scheme using Block and Gray-Level Histograms
As one of the crucial problems in watermarking, robustness against geometric distortion and JPEG compression becomes more than challenging and problematic. In this paper, a robust...
Chi-Man Pun, Xiaochen Yuan
JDCTA
2010
187views more  JDCTA 2010»
8 years 1 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
JDCTA
2010
172views more  JDCTA 2010»
8 years 1 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
JDCTA
2010
130views more  JDCTA 2010»
8 years 1 months ago
A Search Algorithm for Clusters in a Network or Graph
A novel breadth-first based structural clustering method for graphs is proposed. Clustering is an important task for analyzing complex networks such as biological networks, World ...
Dongming Chen, Jing Wang, Xiaodong Chen, Xiaowei X...
JDCTA
2010
143views more  JDCTA 2010»
8 years 1 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
JDCTA
2010
150views more  JDCTA 2010»
8 years 1 months ago
Ignition Coil Insulation Fault Detection Algorithm
Pulse singularities with variable amplitudes appear in the corresponding positions of ignition coil primary current waveform when insulation fault occurs during the ignition proce...
Mutian Li, Yongping Zhao, Qisong Wang
JDCTA
2010
150views more  JDCTA 2010»
8 years 1 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu
books