Sciweavers

1404 search results - page 234 / 281
» internet 2010
Sort
View
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 9 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
CORR
2010
Springer
95views Education» more  CORR 2010»
14 years 9 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
CIKM
2010
Springer
14 years 8 months ago
Challenges in personalized authority flow based ranking of social media
As the social interaction of Internet users increases, so does the need to effectively rank social media. We study the challenges of personalized ranking of blog posts. Web search...
Hassan Sayyadi, John Edmonds, Vagelis Hristidis, L...
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 8 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
IAJIT
2010
99views more  IAJIT 2010»
14 years 8 months ago
Semiotics Explorations on Designing the Information Intensive Web Interfaces
: The growth of technological innovations, internet developments, and their (web) applications has raised a definite issue on retaining the web interface quite understandable. More...
Muhammad Islam, Mohsin Ali, Ali Al-Mamun, Motaharu...