Sciweavers

859 search results - page 140 / 172
» The Changing Face of Cryptography
Sort
View
IAJIT
2008
139views more  IAJIT 2008»
14 years 9 months ago
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
: Internet-based Mobile Ad Hoc Networking (MANET) is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in ...
Velmurugan Ayyadurai, Rajaram Ramasamy
IJFCS
2006
119views more  IJFCS 2006»
14 years 9 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
CORR
2007
Springer
137views Education» more  CORR 2007»
14 years 9 months ago
Cross-Matching Multiple Spatial Observations and Dealing with Missing Data
: Cross-match spatially clusters and organizes several astronomical point-source measurements from one or more surveys. Ideally, each object would be found in each survey. Unfortun...
Jim Gray, Alexander S. Szalay, Tamas Budavari, Rob...
JITECH
2008
117views more  JITECH 2008»
14 years 9 months ago
Towards a theory of organizational information services
: The use of information technology (IT) in organizations has undergone dramatic changes the past 30 years. As a result, it has become increasingly common to adopt a services rathe...
Lars Mathiassen, Carsten Sørensen
JMM2
2008
84views more  JMM2 2008»
14 years 9 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...