Sciweavers

5088 search results - page 933 / 1018
» Rich Internet Applications
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
15 years 4 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
IJWBC
2006
111views more  IJWBC 2006»
15 years 4 months ago
SIOC: an approach to connect web-based communities
: Online communities are islands of people and topics that are not interlinked. Complementary discussions exist on disparate systems but it is currently difficult to exploit the av...
John G. Breslin, Stefan Decker, Andreas Harth, Uld...
JCM
2008
101views more  JCM 2008»
15 years 4 months ago
WiMAX: The Innovative Broadband Wireless Access Technology
The telecommunication industry has been through disruptive times, but data networking service revenue has continued to rise. The telecom industry is expected to continue to grow as...
Abdulrahman Yarali, Saifur Rahman, Bwanga Mbula
JCP
2008
160views more  JCP 2008»
15 years 4 months ago
A Bluetooth-based Sensor Node for Low-Power Ad Hoc Networks
TCP/IP has recently taken promising steps toward being a viable communication architecture for networked sensor nodes. Furthermore, the use of Bluetooth can enable a wide range of ...
Jens Eliasson, Per Lindgren, Jerker Delsing
JMM2
2008
160views more  JMM2 2008»
15 years 4 months ago
A Film Classifier Based on Low-level Visual Features
We propose an approach to classify the film classes by using low level features and visual features. This approach aims to classify the films into genres. Our current domain of stu...
Hui-Yu Huang, Weir-Sheng Shih, Wen-Hsing Hsu