Sciweavers

359 search results - page 29 / 72
» Supporting Real World Security Models in Java
Sort
View
JMM2
2008
84views more  JMM2 2008»
15 years 2 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
133
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 2 months ago
A Logical Temporal Relational Data Model
Time is one of the most difficult aspects to handle in real world applications such as database systems. Relational database management systems proposed by Codd offer very little ...
Nadeem Mahmood, Aqil Burney, Kamran Ahsan
149
Voted
INTERNET
2002
175views more  INTERNET 2002»
15 years 2 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
AINA
2009
IEEE
15 years 5 months ago
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
118
Voted
VRML
2000
ACM
15 years 7 months ago
MVIP - audio enabled multicast VNet
This paper presents a multicast approach to shared virtual worlds. A shared VRML world is described with integrated spatial audio in a freeware VRML browser. An implementation in ...
John L. Robinson, John A. Stewart, Isabelle Labb&e...