Sciweavers

8499 search results - page 98 / 1700
» cans 2009
Sort
View
123
Voted
CIIA
2009
15 years 1 months ago
Web Services Composition Applying MDA
Currently, Web services are available on Internet in a simple and easy way to use. However, a single service can not respond to a predetermined request by user. Thus, it is necessa...
Yamina Hachemi, Mimoun Malki, Djamel Amar Bensaber
AICS
2009
14 years 10 months ago
Using Shallow Natural Language Processing in a Just-In-Time Information Retrieval Assistant for Bloggers
Abstract. Just-In-Time Information Retrieval agents proactively retrieve information based on queries that are implicit in, and formulated from, the user's current context, su...
Ang Gao, Derek G. Bridge
ICITS
2009
14 years 10 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
119
Voted
ICUMT
2009
14 years 10 months ago
Hierarchical p2p overlays for DVE: An Additively Weighted Voronoi based approach
This paper presents a support for the development of Distributed Virtual Environments (DVEs) on P2P architectures. A hierarchical overlay is defined by pairing each peer with a wei...
Michele Albano, Laura Ricci, Luca Genovali
ICUMT
2009
14 years 10 months ago
Simulation analysis of Bluetooth Piconets self-disturbance in industrial applications: A case study
- Wireless systems operating in the 2.4 GHz ISM frequency band and sharing the same environment in an industrial environment are likely to interfere with each other due to simultan...
Muhammad Kamran Khan, Ahmad Ali Tabassam, Farhan A...