Sciweavers

15379 search results - page 2886 / 3076
» Protecting users from
Sort
View
CPHYSICS
2007
222views more  CPHYSICS 2007»
15 years 4 months ago
JADAMILU: a software code for computing selected eigenvalues of large sparse symmetric matrices
A new software code for computing selected eigenvalues and associated eigenvectors of a real symmetric matrix is described. The eigenvalues are either the smallest or those closes...
Matthias Bollhöfer, Yvan Notay
112
Voted
JNW
2008
77views more  JNW 2008»
15 years 4 months ago
Datacasting In The Mobile Environment
Datacasting employs the excess bandwidth from digital television signals for use in one-way data transmission, and it is being used successfully for high-speed downloads at fixed l...
Kent Chamberlin, Benjamin McMahon, Scott Valcourt
151
Voted
JNW
2008
83views more  JNW 2008»
15 years 4 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
JTAER
2008
175views more  JTAER 2008»
15 years 4 months ago
A Core Component-based Modelling Approach for Achieving e-Business Semantics Interoperability
The adoption of advanced integration technologies that enable private and public organizations to seamlessly execute their business transactions electronically is still relatively...
Till Janner, Fenareti Lampathaki, Volker Hoyer, Sp...
JUCS
2008
115views more  JUCS 2008»
15 years 4 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
« Prev « First page 2886 / 3076 Last » Next »