Sciweavers

43 search results - page 5 / 9
» aiss 2010
Sort
View
AISS
2010
115views more  AISS 2010»
13 years 8 months ago
Network Connection and Perfectly Secure Message Transmission on Wireless Mobile Networks
In this paper we proposed perfectly secure message transmission for reliable and secure communications in order to ensure that an adversary cannot obtain information (in the infor...
Sun-Young Lee
AISS
2010
97views more  AISS 2010»
13 years 8 months ago
The Naming Service of Multi-Agent for the Sensor Network Applications
The node selection for the migration of a mobile agent depends on the content of the referenced metadata in the naming space. The reliability of the migrated information is determ...
Yonsik Lee, Minseok Jang
AISS
2010
125views more  AISS 2010»
13 years 8 months ago
A Dual-Mode Intelligent Shopping Assistant
"Radio Frequency Identification" (RFID) promises to enable an automatic collection of shopping data for business intelligent purposes. Three important components of inte...
Lilac A. E. Al-Safadi
AISS
2010
119views more  AISS 2010»
13 years 8 months ago
Distributed Cipher Services Using Object Activation
As the World Wide Web grows rapidly on a daily basis, the number of new computer attacks is also growing at a matching rate. It is increasing by development of information and com...
JinKyoung Heo
AISS
2010
143views more  AISS 2010»
13 years 8 months ago
Service Oriented Business Modeling To Identify Software Services
Service orientation is one of the solutions for achieving agile enterprises, that helps make an alignment between business and information technology. By the influx of service ori...
Aida Amini Motlagh, Mir Ali Seyyedi