Sciweavers

738 search results - page 85 / 148
» Comparison of Approaches to Service Deployment
Sort
View
JCM
2008
101views more  JCM 2008»
13 years 8 months ago
WiMAX: The Innovative Broadband Wireless Access Technology
The telecommunication industry has been through disruptive times, but data networking service revenue has continued to rise. The telecom industry is expected to continue to grow as...
Abdulrahman Yarali, Saifur Rahman, Bwanga Mbula
PERCOM
2003
ACM
14 years 8 months ago
Providing Contextual Information to Pervasive Computing Applications
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Glenn Judd, Peter Steenkiste
ESORICS
2007
Springer
14 years 2 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
OR
2011
Springer
13 years 3 months ago
Modeling an e-government observatory for rural SMEs using UML with RUP
Developing Web-based systems for agriculture and rural development requires the collaboration of experts from different scientific fields and backgrounds. Thus, it is crucial to ...
Sotiris Karetsos, Nikos Manouselis, Constantina Co...
JPDC
2006
103views more  JPDC 2006»
13 years 8 months ago
Fractal: A mobile code-based framework for dynamic application protocol adaptation
The rapid growth of heterogeneous devices and diverse networks in our daily life, makes it is very difficult, if not impossible, to build a one-size-fits-all application or protoc...
Hanping Lufei, Weisong Shi