Sciweavers

20024 search results - page 3764 / 4005
» Database Management Systems
Sort
View
170
Voted
JCM
2006
144views more  JCM 2006»
15 years 3 months ago
Using Micro-Genetic Algorithms to Improve Localization in Wireless Sensor Networks
Wireless sensor networks are widely adopted in many location-sensitive applications including disaster management, environmental monitoring, military applications where the precise...
Vincent Tam, King-Yip Cheng, King-Shan Lui
127
Voted
JCP
2006
110views more  JCP 2006»
15 years 3 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
JUCS
2008
132views more  JUCS 2008»
15 years 3 months ago
Testing Website Usability in Spanish-Speaking Academia through Heuristic Evaluation and Cognitive Walkthroughs
: Although usability evaluations have been focused on assessing different contexts of use, no proper specifications have been addressed towards the particular environment of academ...
María Paula González, Toni Granoller...
122
Voted
DSS
2007
124views more  DSS 2007»
15 years 3 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
127
Voted
JHSN
2006
95views more  JHSN 2006»
15 years 3 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
« Prev « First page 3764 / 4005 Last » Next »