Sciweavers

58933 search results - page 11686 / 11787
» Information
Sort
View
153
Voted
DKE
2010
136views more  DKE 2010»
15 years 1 months ago
Application integration on the user interface level: An ontology-based approach
Integration of software applications can be achieved on different levels: the data level, the business logic level, and the user interface level. Integration on the user interface ...
Heiko Paulheim, Florian Probst
147
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
On Comparing the Performance of Dynamic Multi-Network Optimizations
With a large variety of wireless access technologies available, multi-homed devices may strongly improve the performance and reliability of communication when using multiple networ...
Geert Jan Hoekstra, Robert D. van der Mei, J. W. B...
GLOBECOM
2010
IEEE
15 years 1 months ago
A Controlled Coalitional Game for Wireless Connection Sharing and Bandwidth Allocation in Mobile Social Networks
Mobile social networks have been introduced as a new efficient (i.e., minimize resource usage) and effective (i.e., maximize the number of target recipients) way to disseminate con...
Dusit Niyato, Zhu Han, Walid Saad, Are Hjør...
ICDCS
2010
IEEE
15 years 1 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
164
Voted
IJCMAM
2010
160views more  IJCMAM 2010»
15 years 1 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
« Prev « First page 11686 / 11787 Last » Next »