Sciweavers

1739 search results - page 306 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
INFOCOM
2008
IEEE
15 years 6 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 5 months ago
Improving the Response Time of Business Processes: An Alert-Based Analytical Approach
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...
IEEEARES
2006
IEEE
15 years 5 months ago
The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine
Healthcare organisations practicing evidence-based medicine strive to unite their data assets in order to achieve a wider knowledge base for more sophisticated research as well as...
Nevena Stolba, Marko Banek, A. Min Tjoa
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
15 years 5 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...