Sciweavers

680 search results - page 108 / 136
» Locating Hidden Servers
Sort
View
JUCS
2006
86views more  JUCS 2006»
14 years 9 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
JLBS
2007
75views more  JLBS 2007»
14 years 9 months ago
Designing privacy-aware mobility pricing systems based on user perspective
Mobility-pricing is one of the avenues leading to the information highway. Using a combination of positioning, communication and information processing, automobile insurance can b...
Muhammad Usman Iqbal, Samsung Lim
ESWA
2007
127views more  ESWA 2007»
14 years 9 months ago
An anticipation model of potential customers' purchasing behavior based on clustering analysis and association rules analysis
This paper proposes an anticipation model of potential customers’ purchasing behavior. This model is inferred from past purchasing behavior of loyal customers and the web server...
Horng-Jinh Chang, Lun-Ping Hung, Chia-Ling Ho
INFSOF
2002
108views more  INFSOF 2002»
14 years 9 months ago
Architectural styles for distributed processing systems and practical selection method
The software architecture of a system has influences against various software characteristics of the system such as efficiency, reliability, maintainability, and etc.. For support...
Yoshitomi Morisawa, Katsuro Inoue, Koji Torii
JNCA
1998
108views more  JNCA 1998»
14 years 9 months ago
User interface for video observation over the internet
We present the design and application of a system for live video transmission and remote camera control over the World Wide Web. Extensive testing of the Internet Video Server IV...
Bor Prihavec, Franc Solina