Sciweavers

3747 search results - page 619 / 750
» Active Operations on Collections
Sort
View
ICEGOV
2009
ACM
13 years 6 months ago
Design of a web-based tendering system for e-government procurement
Procurement for e-Government is an important part of activities which are similar to the nature of B2B. That is usually characterized by bulk volumes with complex variables, burea...
Simon Fong, Zhuang Yan
ICMCS
2009
IEEE
171views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Optimal joint linear acoustic echo cancelation and blind source separation in the presence of loudspeaker nonlinearity
Acoustic echoes represent a major source of discomfort in hands free, full-duplex, communication systems. The problem becomes particularly difficult when the loudspeakers are nonl...
Mehrez Souden, Zicheng Liu
ISCI
2010
146views more  ISCI 2010»
13 years 6 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
CSCW
2011
ACM
13 years 4 months ago
Virtual gifts and guanxi: supporting social exchange in a chinese online community
Significant cultural differences persist between East and West. Software systems that have been proven to operate efficiently within one culture can fail in the context of the oth...
Jiang Yang, Mark S. Ackerman, Lada A. Adamic
JDCTA
2010
125views more  JDCTA 2010»
13 years 3 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng