Sciweavers

851 search results - page 70 / 171
» Network Effects and Technology Licensing
Sort
View
151
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
137
Voted
IWRT
2008
109views Communications» more  IWRT 2008»
15 years 5 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
132
Voted
SEDE
2007
15 years 5 months ago
Self-organizing map based web pages clustering using web logs
A Web-based business always wants to have the ability to track users’ browsing behavior history. This ability can be achieved by using Web log mining technologies. In this paper...
Dehu Qi, Chung-Chih Li
134
Voted
CANDC
2009
ACM
15 years 7 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
129
Voted
JNW
2006
111views more  JNW 2006»
15 years 3 months ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki