Sciweavers

17164 search results - page 3228 / 3433
» Applications of Sensor Networks
Sort
View
116
Voted
ECIS
2003
15 years 6 months ago
From e-business to knowledge e-trading
This paper aims to show investigations made in knowledge e-marketplaces (Ke-markets). It gathers, reviews, structures, and compiles in a homogeneous presentation information of th...
Emanuela Pauselli
138
Voted
LISA
2001
15 years 6 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
165
Voted
GEOINFO
2003
15 years 6 months ago
Integrating Telecom Outside Plant Systems through the GML Standard
This paper introduces the Telecommunication Outside Plant Markup Language (TOPML), an OpenGis GML (Geographic Markup Language) application schema designed to describe telecommunica...
Gerson Mizuta Weiss
MASCOTS
2001
15 years 6 months ago
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem
As the Internet commerce becomes a more important part of the economy, network security is receiving more emphasis. Time spent in data encryption can be a significant performance ...
Zhi Li, John Higgins, Mark J. Clement
IADIS
2003
15 years 6 months ago
Personalization of Information Delivery by the Use of Agents
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
Jarogniew Rykowskia, Arkadiusz Juszkiewicz
« Prev « First page 3228 / 3433 Last » Next »