Sciweavers

NBIS
2009
Springer
14 years 4 months ago
Analysis of Web Alert Models
act— Web alerts are user-defined monitor conditions for public Internet information in which notification messages are sent to users whenever their alert conditions are met. The ...
Jameela Al-Jaroodi, Nader Mohamed
NBIS
2009
Springer
14 years 4 months ago
A Mobile Personalized RFID System
Ruay-Shiung Chang, Jih-Sheng Chang, Jiing-Hsing Ru...
NBIS
2009
Springer
14 years 4 months ago
A Security Framework for JXTA-Overlay
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
NBIS
2009
Springer
14 years 6 months ago
Challenges in the Development of Mobile Applications in Industrial Field Service
Utilizing mobile applications in the area of industrial field service promises several benefits, especially improved process support providing tailored service information and p...
Markus Aleksy, Bernd Stieger
NBIS
2009
Springer
14 years 6 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
NBIS
2009
Springer
14 years 6 months ago
Enhancing Simulation Mode Operation of ospfd
In this paper, we describe our modifications to ospfd, a popular open-source implementation of OSPF routing protocol. The ospfd software can also be run in simulation mode, where...
Weigao Xie, Balaji Polepalli, Mukul Goyal, Hossein...
NBIS
2009
Springer
14 years 6 months ago
Astro-WISE: Tracing and Using Lineage for Scientific Data Processing
Johnson Mwebaze, Danny Boxhoorn, Edwin Valentijn
NBIS
2009
Springer
14 years 6 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena