Sciweavers

1404 search results - page 257 / 281
» internet 2010
Sort
View
IJIDE
2010
152views more  IJIDE 2010»
14 years 4 months ago
Digital Divide in India: Measurement, Determinants and Policy for Addressing the Challenges in Bridging the Digital Divide
: In the recent years, the notion of `digital divide' has been widely researched, and has attracted much debate and speculation for its economic, social and political conseque...
Sumanjeet Singh
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 4 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
JCAL
2010
101views more  JCAL 2010»
14 years 4 months ago
How East Asian classrooms may change over the next 20 years
Our schools have been experiencing three overlapping waves of technology adoption since the mid-1980s: the personal computer lab wave, the online learning wave, and the digital cl...
Tak-Wai Chan
JIPS
2010
195views more  JIPS 2010»
14 years 4 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
JUCS
2010
114views more  JUCS 2010»
14 years 4 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich