Sciweavers

95 search results - page 11 / 19
» jdcta 2010
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
14 years 4 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
JDCTA
2010
171views more  JDCTA 2010»
14 years 4 months ago
A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database
To manage the complicated data such as recursive elements, multiply namespaces, repeatable structures, extended elements and attributes in the XML Binding documents of distance ed...
Xin-hua Zhu, Qing-ling Zeng, Qing-hua Cao
JDCTA
2010
163views more  JDCTA 2010»
14 years 4 months ago
Predictive Analysis for Customer Relationship Management
The approach for predictive analysis focuses on a business strategy to streamline business-customer relationships in order to maximize client satisfaction and thereby improve cust...
Manisha Rathi, Anand Priyadarshini, Ankit Rastogi
JDCTA
2010
163views more  JDCTA 2010»
14 years 4 months ago
An Efficient Syntactic Analyzer Using Semantic Connection Units
We implement a Korean syntactic analyzer which decreases many ambiguities in syntax parse trees using segmentation and semantic connection units. We use dependency grammar for par...
Yong-uk Park, Hyuk-chul Kwon
JDCTA
2010
139views more  JDCTA 2010»
14 years 4 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh