Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
Developing Web applications is usually accomplished in ad hoc manner. Such manner generally results in very poor quality products, with "spaghetti-like" structures makin...
Mohamed Sharaf Aun, I. M. Atiqul, Shoji Yuen, Kiyo...
Participatory search can be defined as a search service framework where each participant takes care of gathering information and contributing indexes to a central location where t...
Giuseppe Attardi, Andrea Esuli, Lucian Hancu, Mari...
Currently, in the field of technology monitoring, it is very important to be able to get relevant information from heterogeneous sources, especially on the World Wide Web. The com...
The performance evaluation of an information retrieval system is a decisive aspect for the measure of the improvements in search technology. Our work intends to provide a framewor...
Our objective is to obtain the level of usability of a software application over the different tasks for which it has been developed. Nowadays, usability is measured through diffe...
The management of the relationship between student and learning environment during an e-learning process is a fundamental item both from the pedagogical and technical point of vie...
Anna Angelini, Enrica Gentile, Umberto Ostello, Pa...
There is a great amount of information on the web that can not be accessed by conventional crawler engines. This portion of the web is usually called hidden web data. To be able t...
The Internet/World Wide Web (Web) is an important way for the sharing of business information between retail firms and their customers. Although electronic commerce (e-commerce) h...
Enterprise Application Integration (EAI) techniques are today widely adopted to build Enterprise Information Systems. Moreover the increasing reliability of tools and techniques s...