Skip to main content

Page of 47
and
  1. No Access

    Chapter and Conference Paper

    A Model for Mobile Television Applications Based on Verbal Decision Analysis

    The emergence of Digital Television - DTV brings the necessity to select an interface that may be used in Digital Television for Mobile Devices. Many different candidate solutions for interaction applications ...

    Isabelle Tamanini, Thais C. Sampaio Machado in Advances in Computer and Information Scien… (2008)

  2. No Access

    Chapter and Conference Paper

    Grid Computing Implementation in Ad Hoc Networks

    The development of ubiquitous computing and mobility opens challenges for implementation of grid computing in ad hoc network environments. In this paper, a new grid computing implementation for ad hoc networks...

    Aksenti Grnarov, Bekim Cilku, Igor Miskovski in Advances in Computer and Information Scien… (2008)

  3. No Access

    Chapter and Conference Paper

    Securing XML Web Services by using a Proxy Web Service Model

    XML Web Services play a fundamental role in creating distributed, integrated and interoperable solutions across the Internet. The main problem that XML Web Services face is the lack of support for security in ...

    Quratul-ain Mahesar in Advances in Computer and Information Scien… (2008)

  4. No Access

    Chapter and Conference Paper

    Extension of Aho-Corasick Algorithm to Detect Injection Attacks

    In this paper we propose an extension to the Aho-Corasick algorithm to detect injection of characters introduced by a malicious attacker. We show how this is achieved without significantly increasing the size ...

    Jalel Rejeb, Mahalakshmi Srinivasan in Advances in Computer and Information Scien… (2008)

  5. No Access

    Chapter and Conference Paper

    Factors for E-Services System Acceptance: A Multivariate Analysis

    This study investigates factors that influence the acceptance and use of e-Services. The research model includes factors such as user experience, user motivation, perceived usefulness and perceived ease of use...

    Kamaljeet Sandhu in Advances in Computer and Information Sciences and Engineering (2008)

  6. No Access

    Chapter and Conference Paper

    Intuitive Interface for the Exploration of Volumetric Datasets

    Conventional human-computer interfaces for the exploration of volume datasets employ the mouse as an input device. Specifying an oblique orientation for a cross-sectional plane through the dataset using such i...

    Rahul Sarkar, Chrishnika de Almeida in Advances in Computer and Information Scien… (2008)

  7. No Access

    Chapter and Conference Paper

    Component Based Face Recognition System

    The goal of this research paper was to design and use a component based approach to face recognition and show that this technique gives us recognition rates of up to 92%. A novel graphical user interface was a...

    Pavan Kandepet, Roman W. Swiniarski in Advances in Computer and Information Scien… (2008)

  8. No Access

    Chapter and Conference Paper

    Theoretical Perspectives for E-Services Acceptance Model

    Web-based e-service user adoption and continuance requires an understanding of consumer contextual factors. In this context, e-service is referred to (interactive) service being provided on the website. This p...

    Kamaljeet Sandhu in Advances in Computer and Information Sciences and Engineering (2008)

  9. No Access

    Chapter and Conference Paper

    Construction of Group Rules for VLSI Application

    An application of cellular automata (CA) has been proposed for building parallel processing systems, cryptographic hashing functions, and VLSI technology. Recently, Das et al. have reported characterization of...

    Byung-Heon Kang, Dong-Ho Lee, Chun-Pyo Hong in Advances in Computer and Information Scien… (2008)

  10. No Access

    Chapter and Conference Paper

    On Use of Operation Semantics for Parallel iSCSI Protocol

    iSCSI [1,2], is an emerging communication protocol enabling block data transport over TCP/IP network. The iSCSI protocol is perceived as a low cost alternative to the FC protocol for networked storages [8, 9, ...

    Ranjana Singh, Rekha Singhal in Advances in Computer and Information Scien… (2008)

  11. No Access

    Chapter and Conference Paper

    Simulating VHDL in PSpice Software

    This paper incorporates the use of PSpice to simplify massive complex circuits. This involves the simulation of a VHDL based designed processor in PSpice software. After reading through the various properties ...

    Saeid Moslehpour, Chandrasekhar Puliroju in Advances in Computer and Information Scien… (2008)

  12. No Access

    Chapter and Conference Paper

    Transferable Lessons from Biological and Supply Chain Networks to Autonomic Computing

    Autonomic computing undoubtedly represents the solution for dealing with the complexity of modern computing systems, driven by ever increasing user needs and requirements. The design and management of autonomi...

    Ani Calinescu in Advances in Computer and Information Sciences and Engineering (2008)

  13. No Access

    Chapter and Conference Paper

    A Model for Prevention of Software Piracy through Secure Distribution

    Although many anti-piracy methods are prevalent today in the software market, still software piracy is constantly on the rise. The cause of this can be attributed to (a) either these methods are very expensive...

    Vaddadi P. Chandu, Karandeep Singh in Advances in Computer and Information Scien… (2008)

  14. No Access

    Chapter and Conference Paper

    Introducing MARF: a Modular Audio Recognition Framework and its Applications for Scientific and Software Engineering Research

    In this paper we introduce a Modular Audio Recognition Framework (MARF), as an open-source research platform implemented in Java. MARF is used to evaluate various pattern-recognition algorithms and beyond in a...

    Serguei A. Mokhov in Advances in Computer and Information Sciences and Engineering (2008)

  15. No Access

    Chapter and Conference Paper

    A Secure and Efficient Micropayment System

    In this paper, we analyze some key issues concerning systems for processing Internet micropayments. At the heart of the matter is the trade-off between security and cost considerations. A set of criteria is pr...

    Anne Nguyen, **ang Shao in Advances in Computer and Information Sciences and Engineering (2008)

  16. No Access

    Chapter and Conference Paper

    A Survey of Hands-on Assignments and Projects in Undergraduate Computer Architecture Courses

    Computer Architecture and Organization is an important area of the computer science body of knowledge. How to teach and learn the subjects in this area effectively has been an active research topic. This paper...

    Xuejun Liang in Advances in Computer and Information Sciences and Engineering (2008)

  17. No Access

    Chapter and Conference Paper

    A Concatenative Synthesis Based Speech Synthesiser for Hindi

    The document presents a speech synthesis system based upon hidden Markov models and decision trees. The development follows the approach generally implemented for speech recognition systems. A front end analys...

    Kshitij Gupta in Advances in Computer and Information Sciences and Engineering (2008)

  18. No Access

    Chapter and Conference Paper

    Resource Discovery and Selection for Large Scale Query Optimization in a Grid Environment

    Current peer to peer (P2P) methods employing distributed hash tables (DHT) for resource discovery in a Grid environment suffer from these problems: (i) the risk of network congestion due to the sent messages f...

    Mahmoud El Samad, Abdelkader Hameurlain in Advances in Computer and Information Scien… (2008)

  19. No Access

    Chapter and Conference Paper

    Measurement-Based Admission Control for Non-Real-Time Services in Wireless Data Networks

    Non-real-time services are an important category of network services in future wireless networks. When mobile users access non-real-time services, mobile users usually care about two important points; one is w...

    Show-Shiow Tzeng, Hsin-Yi Lu in Advances in Computer and Information Scien… (2008)

  20. No Access

    Chapter and Conference Paper

    Biometric Approaches of 2D-3D Ear and Face: A Survey

    The use of biometrics in human recognition is rapidly gaining in popularity. Considering the limitations of biometric systems with a single biometric trait, a current research trend is to combine multiple trai...

    S. M. S. Islam, M. Bennamoun, R. Owens in Advances in Computer and Information Scien… (2008)

Page of 47