Sciweavers

8023 search results - page 1532 / 1605
» Internet Technology
Sort
View
JDCTA
2008
160views more  JDCTA 2008»
15 years 5 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
JNW
2006
186views more  JNW 2006»
15 years 5 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
IWC
2007
92views more  IWC 2007»
15 years 5 months ago
Consumers, channels and communication: Online and offline communication in service consumption
This paper reports on a study that investigated consumer use of e-services in a multichannel context. To develop a deeper understanding of what makes consumers decide to use the o...
Geke van Dijk, Shailey Minocha, Angus Laing
CLUSTER
2004
IEEE
15 years 5 months ago
DyRAM: An Active Reliable Multicast Framework for Data Distribution
Group communications (multicast) are foreseen to be one of the most critical yet challenging technologies to meet the exponentially growing demands for data distribution in a large...
Moufida Maimour, CongDuc Pham
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 5 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
« Prev « First page 1532 / 1605 Last » Next »