Sciweavers

IEEECIT
2005
IEEE
14 years 2 months ago
Sharing Ontology Schema Information for Web Service Integration
In spite of many standards efforts, Web services with similar or compatible functionalities often have heterogeneous semantics. One reason is the disparate ontologies used for ser...
Jingshan Huang, Rosa Laura Zavala Gutierrez, Benit...
IEEECIT
2005
IEEE
14 years 2 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
ICITA
2005
IEEE
14 years 2 months ago
Performance Tuning in the MacauMap Mobile Map Application
With the increasing popularity of mobile computing platforms such as personal digital assistants (PDAs) and smart mobile phones, applications originally designed for higherperform...
Robert P. Biuk-Aghai
ICITA
2005
IEEE
14 years 2 months ago
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would I
Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
ICITA
2005
IEEE
14 years 2 months ago
Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms
Even though IPv6 has been developed for more than a decade, IPv4 is still the most commonly adopted network protocol. However, the significant changes in the new version may cause...
I-Ping Hsieh, Shang-Juh Kao
ICITA
2005
IEEE
14 years 2 months ago
Some Remarks on Security of Receipt-Free E-auction
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
ICITA
2005
IEEE
14 years 2 months ago
A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) enable all mobile nodes to communicate each other without base stations or access points, and the transfer of data packets is completed through the...
Ying-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien...
ICITA
2005
IEEE
14 years 2 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
ICITA
2005
IEEE
14 years 2 months ago
Partition-Based Parallel PageRank Algorithm
A re-ranking technique,called “PageRank brings a successful story behind the search engine. Many studies focus on finding an way to compute the PageRank scores of a large web gr...
Arnon Rungsawang, Bundit Manaskasemsak
ICITA
2005
IEEE
14 years 2 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon