Sciweavers

537 search results - page 6 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
MOBICOM
2004
ACM
14 years 25 days ago
Performance optimizations for wireless wide-area networks: comparative study and experimental evaluation
We present a comparative performance study of a wide selection of optimization techniques to enhance application performance in the context of wide-area wireless networks (WWANs)....
Rajiv Chakravorty, Suman Banerjee, Pablo Rodriguez...
IWC
2007
106views more  IWC 2007»
13 years 7 months ago
The role of social presence in establishing loyalty in e-Service environments
Compared to offline shopping, the online shopping experience may be viewed as lacking human warmth and sociability as it is more impersonal, anonymous, automated and generally dev...
Dianne Cyr, Khaled Hassanein, Milena M. Head, Alex...
ACSC
2003
IEEE
14 years 21 days ago
A Comparative Study for Domain Ontology Guided Feature Extraction
We introduced a novel method employing a hierarchical domain ontology structure to extract features representing documents in our previous publication (Wang 2002). All raw words i...
Bill B. Wang, Robert I. McKay, Hussein A. Abbass, ...
BMCBI
2007
160views more  BMCBI 2007»
13 years 7 months ago
Establishing a major cause of discrepancy in the calibration of Affymetrix GeneChips
Background: Affymetrix GeneChips are a popular platform for performing whole-genome experiments on the transcriptome. There are a range of different calibration steps, and users a...
Andrew P. Harrison, Caroline E. Johnston, Christin...
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 7 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo