Sciweavers

5 search results - page 1 / 1
» ike 2010
Sort
View
141
Voted
IKE
2010
14 years 10 months ago
A Conceptual Model for Measuring the Quality of e-learning through Knowledge Sharing Indicators
- The eras in which learning was limited to a special class of people has far reached its end. Rapid changes of information technologies, which affect all aspects of today's l...
Iman Raeesi, Davood Qorbani, Babak Akhgar
162
Voted
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
15 years 6 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
122
Voted
IKE
2010
14 years 11 months ago
Towards Context-Aware Real-Time Information Dissemination
Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant ...
Kyoung-Don Kang, Greg Vert
113
Voted
IKE
2010
14 years 11 months ago
Active Datawarehouse Loading by Tool Based ETL Procedure
: Over the years, DataWarehousing has gone through a number of evolutions from a relatively simple reporting database to sophisticated analytical applications such as analyzing cus...
Mallikharjuna Reddy V, Sanjay K. Jena
IKE
2010
14 years 11 months ago
Potential Application of Contextual Information Processing To Data Mining
Contextual processing is a new emerging field based on the notion that information surrounding an event lends new meaning to the interpretation of the event. Data mining is the pr...
Gregory Vert, Anitha Chennamaneni, S. Sitharama Iy...