Sciweavers

4262 search results - page 215 / 853
» Internet and Intranet Computing
Sort
View
AH
2000
Springer
15 years 8 months ago
Case-Based User Profiling for Content Personalisation
As it stands the Internet’s “one size fits all” approach to information retrieval presents the average user with a serious information overload problem. Adaptive hypermedia s...
Keith Bradley, Rachael Rafter, Barry Smyth
ICWS
2004
IEEE
15 years 5 months ago
Business Services Networks
The fundamental challenge of e-commerce is enabling companies to do business with one another across a network, despite different business processes and computer systems. Traditio...
Jay M. Tenenbaum
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 4 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
PERVASIVE
2009
Springer
15 years 10 months ago
Askus: Amplifying Mobile Actions
Information sharing has undeniably become ubiquitous in the Internet age. The global village created on the Internet provides people with instant access to information and news on ...
Shin'ichi Konomi, Niwat Thepvilojanapong, Ryohei S...
DSN
2008
IEEE
15 years 10 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou