Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Database technology and the Structured Query Language (SQL) have grown enormously in recent years. Applications from different domains have different requirements for using databa...
Being aware of the relationships that exist between objects of interest is crucial in many situations. The RelFinder user interface helps to get an overview: Even large amounts of...
Steffen Lohmann, Philipp Heim, Timo Stegemann, J&u...
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasing...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
Interfaces for users on the web are usually created using standard HTML-technologies. Although dynamic textbased features are widely available on the web (e.g. by using DHTML) the...