Sciweavers

13436 search results - page 53 / 2688
» e
Sort
View
PCI
2009
Springer
15 years 7 months ago
Adaptive Evaluation of Portal Quality: An eGovernment Case
— In this paper we describe a knowledge-based approach that enables the subjective evaluation of portal and e-service quality by users in an adaptive manner. The model for adapti...
Babis Magoutas, Gregoris Mentzas
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
15 years 7 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
DSN
2000
IEEE
15 years 7 months ago
Implementing e-Transactions with Asynchronous Replication
ts the abstraction of e-Transactions in three-tier architectures. Three-tier architectures are typically Internetoriented architectures, where the end-user interacts with frontend ...
Svend Frølund, Rachid Guerraoui
ATAL
2006
Springer
15 years 6 months ago
Component Agent Framework for domain-Experts (CAFnE) toolkit
The Component Agent Framework for domain-Experts (CAFnE) toolkit is an extension to the Prometheus Design Tool (PDT). It uses the detailed design produced by PDT with further anno...
Gaya Buddhinath Jayatilleke, John Thangarajah, Lin...
TOOLS
2000
IEEE
15 years 6 months ago
Applying the Lessons of eXtreme Programming
Although eXtreme Programming has been explained by Kent Beck[1], there are many benefits to adopting eXtreme Programming (XP) practices in other development processes. The benefit...
Pete McBreen