Sciweavers

JCP
2006
173views more  JCP 2006»
13 years 11 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
JCP
2006
85views more  JCP 2006»
13 years 11 months ago
How To Generate Distributed Software Components From Centralized Ones?
Adapting software components to be used in a particular application is a crucial issue in software component based technology. In fact, software components can be used in contexts ...
Abdelhak Seriai, Gautier Bastide, Mourad Oussalah
JCP
2006
118views more  JCP 2006»
13 years 11 months ago
Online Mutual Aid, "RAQ": A Study of Anonymous and Traceable Interactions
Our study proposes mutual aid platforms for the resolution of uncommon or non-conforming cases in both administrative and commercial procedures. On reviewing inter-customer interac...
Akiko Orita
JCP
2006
112views more  JCP 2006»
13 years 11 months ago
Mobile Agent Based Wireless Sensor Networks
Recently, mobile agents have been proposed for efficient data dissemination in sensor networks. In the traditional client/server-based computing architecture, data at multiple sour...
Min Chen, Taekyoung Kwon, Yong Yuan, Victor C. M. ...
JCP
2006
120views more  JCP 2006»
13 years 11 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
JCP
2006
135views more  JCP 2006»
13 years 11 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
JCP
2006
106views more  JCP 2006»
13 years 11 months ago
On the Development of Knowledge Management Services for Collaborative Decision Making
Admitting that the quality of a decision depends on the quality of the knowledge used to make it, it is argued that the enhancement of the decision making efficiency and effectiven...
Christina E. Evangelou, Nikos I. Karacapilidis, Ma...
JCP
2006
116views more  JCP 2006»
13 years 11 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
JCP
2006
118views more  JCP 2006»
13 years 11 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji