Sciweavers

1018 search results - page 118 / 204
» Remote User Authentication Using Public Information
Sort
View
BMCBI
2008
103views more  BMCBI 2008»
13 years 8 months ago
The VirusBanker database uses a Java program to allow flexible searching through Bunyaviridae sequences
Background: Viruses of the Bunyaviridae have segmented negative-stranded RNA genomes and several of them cause significant disease. Many partial sequences have been obtained from ...
Mathieu Fourment, Mark J. Gibbs
ICEIS
2003
IEEE
14 years 1 months ago
Widam - Web Interaction Display and Monitoring
: In this paper we describe the design and implementation of a system called Web Interaction Display and Monitoring (WIDAM). We have developed a web based client-server application...
Hugo Gamboa, Vasco Ferreira
IEEECIT
2010
IEEE
13 years 6 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
ACISICIS
2007
IEEE
14 years 2 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
ENTER
2009
Springer
14 years 2 months ago
Personalized Mobile City Transport Advisory System
Mobile devices are becoming an inseparable part of our lives and personalized location-based mobile services are gaining more and more popularity. The scope of this paper is to il...
Gytis Tumas, Francesco Ricci