Sciweavers

851 search results - page 70 / 171
» Network Effects and Technology Licensing
Sort
View
ACSAC
2000
IEEE
14 years 8 days ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
IWRT
2008
109views Communications» more  IWRT 2008»
13 years 9 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
SEDE
2007
13 years 9 months ago
Self-organizing map based web pages clustering using web logs
A Web-based business always wants to have the ability to track users’ browsing behavior history. This ability can be achieved by using Web log mining technologies. In this paper...
Dehu Qi, Chung-Chih Li
CANDC
2009
ACM
13 years 11 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
JNW
2006
111views more  JNW 2006»
13 years 7 months ago
A Novel AP for Improving the Performance of Wireless LANs Supporting VoIP
Recently, wireless LANs based on the IEEE 802.11 standard have become popular and widely used, and Voice-over-IP (VoIP) is one of the most promising technologies to be used in mobi...
Thavisak Manodham, Tetsuya Miki