Sciweavers

2454 search results - page 233 / 491
» Privacy in the Information and Communications Technologies
Sort
View
139
Voted
AC
1998
Springer
15 years 6 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
89
Voted
IEEECIT
2006
IEEE
15 years 7 months ago
A Trap-based Mechanism for Runtime Kernel Modification
Runtime modification of kernel code is a difficult problem. However, the need of modifiable kernel is increasing because new requirements and services that are unanticipated at th...
Young-Pil Kim, Jin-Hee Choi, Chuck Yoo
WEBI
2007
Springer
15 years 8 months ago
Logic Programming to Address Issues of the Semantic Web
The size of the Web and its increase rate made it cumbersome to locate high precision results to a requested piece of information. The Semantic Web provides a framework and a set ...
Isambo Karali
GROUP
2007
ACM
15 years 5 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
137
Voted
FI
2010
175views more  FI 2010»
14 years 11 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao