Sciweavers

2078 search results - page 414 / 416
» Using Aspects to Make Adaptive Object-Models Adaptable
Sort
View
JSW
2008
124views more  JSW 2008»
13 years 7 months ago
Information Storage and Retrieval Schemes for Recycling Products
A recycling object is in its recycle chain and its status may often change according to recycling stage or reusing status; even its structure could often dynamically change accordi...
Takayuki Tsuchida, Teppei Shimada, Tatsuo Tsuji, K...
PERVASIVE
2008
Springer
13 years 7 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...
CIKM
2010
Springer
13 years 6 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...
ISF
2010
109views more  ISF 2010»
13 years 6 months ago
From IT deployment capabilities to competitive advantage: An exploratory study in China
As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shap...
Jun Tian, Kanliang Wang, Yan Chen, Björn Joha...
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 6 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov