Sciweavers

4742 search results - page 890 / 949
» The Information Technology Model Curriculum
Sort
View
JCM
2007
143views more  JCM 2007»
15 years 4 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JTAER
2007
78views more  JTAER 2007»
15 years 4 months ago
A System for Locating Mobile Terminals with Tunable Privacy
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset tech...
Sandford Bessler
UAIS
2008
185views more  UAIS 2008»
15 years 4 months ago
Facial movement analysis in ASL
In the age of speech and voice recognition technologies, sign language recognition is an essential part of ensuring equal access for deaf people. To date, sign language recognition...
Christian Vogler, Siome Goldenstein
JITECH
2010
106views more  JITECH 2010»
15 years 3 months ago
Patterns and structures of intra-organizational learning networks within a knowledge-intensive organization
This paper employs the network perspective to study patterns and structures of intraorganizational learning networks. The theoretical background draws from cognitive theories, the...
Miha Skerlavaj, Vlado Dimovski, Kevin C. Desouza
JUCS
2010
98views more  JUCS 2010»
15 years 3 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati