Sciweavers

1018 search results - page 118 / 204
» Remote User Authentication Using Public Information
Sort
View
BMCBI
2008
103views more  BMCBI 2008»
15 years 5 months ago
The VirusBanker database uses a Java program to allow flexible searching through Bunyaviridae sequences
Background: Viruses of the Bunyaviridae have segmented negative-stranded RNA genomes and several of them cause significant disease. Many partial sequences have been obtained from ...
Mathieu Fourment, Mark J. Gibbs
ICEIS
2003
IEEE
15 years 10 months ago
Widam - Web Interaction Display and Monitoring
: In this paper we describe the design and implementation of a system called Web Interaction Display and Monitoring (WIDAM). We have developed a web based client-server application...
Hugo Gamboa, Vasco Ferreira
IEEECIT
2010
IEEE
15 years 2 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
ACISICIS
2007
IEEE
15 years 11 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
ENTER
2009
Springer
15 years 11 months ago
Personalized Mobile City Transport Advisory System
Mobile devices are becoming an inseparable part of our lives and personalized location-based mobile services are gaining more and more popularity. The scope of this paper is to il...
Gytis Tumas, Francesco Ricci