Sciweavers

8928 search results - page 1581 / 1786
» Modeling Current Events
Sort
View
JCM
2006
112views more  JCM 2006»
15 years 3 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
JCM
2006
73views more  JCM 2006»
15 years 3 months ago
Wireless Networks Revenue Optimization through Overload Control with Priority Services
Wireless networks are currently experiencing more overload situations than their wireline counterparts because of explosive mobile traffic growth, unpredictable traffic behavior, s...
Haitao Lin, Preetam Ghosh, Prabir Das
JCM
2006
169views more  JCM 2006»
15 years 3 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
150
Voted
JSW
2008
106views more  JSW 2008»
15 years 3 months ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
156
Voted
JSW
2008
113views more  JSW 2008»
15 years 3 months ago
Semantic Information Retrieval Based on Fuzzy Ontology for Electronic Commerce
Information retrieval is the important work for Electronic Commerce. Ontology-based semantic retrieval is a hotspot of current research. In order to achieve fuzzy semantic retrieva...
Jun Zhai, Yiduo Liang, Yi Yu, Jiatao Jiang
« Prev « First page 1581 / 1786 Last » Next »