Sciweavers

EATIS
2007
ACM
14 years 3 months ago
A method using time series analysis for IEEE 802.11 WLANs channel forecasting
Abstract-- The growth of wireless network use has greatly increased research demand. Some applications, which are contextaware, must adapt to the environment. So, information on bo...
Jeandro Bezerra, Rudy Braquehais, Filipe Roberto, ...
CIKM
2007
Springer
14 years 3 months ago
Satisfaction balanced mediation
We consider a distributed information system that allows autonomous consumers to query autonomous providers. We focus on the problem of query allocation from a new point of view, ...
Jorge-Arnulfo Quiané-Ruiz, Philippe Lamarre...
ICISS
2007
Springer
14 years 3 months ago
Performance Analysis for Multi Sensor Fingerprint Recognition System
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
Shimon K. Modi, Stephen J. Elliott, Hakil Kim
ICISS
2007
Springer
14 years 3 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
ICEGOV
2007
ACM
14 years 3 months ago
Challenges and issues in e-government project assessment
Electronic Governance (e-Governance) has received a tremendous interest world over. Significant amount of money is being put into making e-Governance a reality. A number of Projec...
Piyush Gupta
ICEGOV
2007
ACM
14 years 3 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
ICEGOV
2007
ACM
14 years 3 months ago
Semantic frameworks for e-government
This paper explains how semantic frameworks can be used to support successful e-Government initiatives by connecting system design to a shared understanding of interactions and pr...
Charles Crichton, Jim Davies, Jeremy Gibbons, Stev...
ICEGOV
2007
ACM
14 years 3 months ago
Analysis of popular open source licenses and their applicability to e-governance
The paper analyses existing open source licenses with the aim of choosing a license that is suitable for e-Governance projects. A method is presented for systematically choosing t...
Jaijit Bhattacharya, Sourabh Suman
ICEGOV
2007
ACM
14 years 3 months ago
Conceptualizing e-Governance
Pierre Rossel, Matthias Finger