Sciweavers

6960 search results - page 970 / 1392
» Continuity Analysis of Programs
Sort
View
WCNC
2008
IEEE
15 years 11 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
COLCOM
2007
IEEE
15 years 11 months ago
Privacy protection on sliding window of data streams
—In many applications, transaction data arrive in the form of high speed data streams. These data contain a lot of information about customers that needs to be carefully managed ...
Weiping Wang 0001, Jianzhong Li, Chunyu Ai, Yingsh...
EUROMICRO
2007
IEEE
15 years 11 months ago
Component-Based and Service-Oriented Software Engineering: Key Concepts and Principles
Component-based software engineering (CBSE) and service-oriented software engineering (SOSE) are two of the most dominant engineering paradigms in current software community and i...
Hongyu Pei Breivold, Magnus Larsson
GLOBECOM
2007
IEEE
15 years 11 months ago
Position Estimation Error in Edge Detection for Wireless Sensor Networks using Local Convex View
Abstract—Intuitively, identification of nodes close to the network edge is key to the successful setup, and continued operation, of many sensor network protocols and application...
Marwan Fayed, Hussein T. Mouftah
HICSS
2007
IEEE
157views Biometrics» more  HICSS 2007»
15 years 11 months ago
E-Government Evaluation: Reflections On Three Organisational Case Studies
The deployment of e-Government continues at a significant cost and pace in the worldwide public sector. An important area of research is that of the evaluation of e-Government. In...
Stephen Jones, Zahir Irani, Amir M. Sharif