Sciweavers

1000 search results - page 51 / 200
» order 2011
Sort
View
IJIRR
2011
135views more  IJIRR 2011»
14 years 6 months ago
Query Recommendation for Improving Search Engine Results
— recently, search engines become more critical for finding information over the World Wide Web where web content growing fast, the user's satisfaction of search engine resu...
Hamada M. Zahera, Gamal F. El-Hady, W. F. Abd El-W...
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 6 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
IJNVO
2011
47views more  IJNVO 2011»
14 years 6 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
IOR
2011
96views more  IOR 2011»
14 years 6 months ago
On the Minimax Complexity of Pricing in a Changing Environment
We consider a pricing problem in an environment where the customers’ willingness-to-pay (WtP) distribution may change at some point over the selling horizon. Customers arrive se...
Omar Besbes, Assaf J. Zeevi