Sciweavers

7433 search results - page 1481 / 1487
» Management of Technology
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
ESWA
2010
109views more  ESWA 2010»
13 years 6 months ago
Visual and tangible interactions with physical and virtual objects using context-aware RFID
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation and interface technology with physical and virtual objects in the ubiquitous comp...
Jae Yeol Lee, Dong Woo Seo, Byung Youn Song, Rajit...
ICMLC
2010
Springer
13 years 6 months ago
Initiated language learning machine with multi-media and speech-recognition techniques
: Facing the 21st century the age of exploration-increasing of all kinds of knowledge and quickly development of information, how to promote the competition potential of our citize...
Dong-Liang Lee, Chun-Liang Hsu, Sheng-Yuan Yang, W...
INFOCOM
2010
IEEE
13 years 5 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
INFSOF
2010
100views more  INFSOF 2010»
13 years 5 months ago
Investigating the impact of a measurement program on software quality
Context: Measurement programs have been around for several decades but have been often misused or misunderstood by managers and developers. This misunderstanding prevented their a...
Houari A. Sahraoui, Lionel C. Briand, Yann-Gaë...
« Prev « First page 1481 / 1487 Last » Next »