Search
Now showing items 1071-1080 of 1136
The role of type II FB (I):Tl+ defect in laser light generation and color image formation at the low coordination surface sites of AgBr: Ab initio calculations
(
Elsevier
, 2006 , Article)
The role of type II FB (I):Tl+ color center at low coordination surface sites of AgBr thin films in providing tunable laser activity and photographic sensitization is examined. The double-well potential at this site is ...
Impact of MD5 authentication on routing traffic for the case of: EIGRP, RIPv2 and OSPF
(
Science Publications
, 2008 , Article)
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Business process reengineering in UAE public sector: A town planning case study
(
Emerald Group Publishing Limited
, 2007 , Article)
Purpose - To reengineer the applications' processes of the land department of Al-Ain Municipality and to develop an electronic version of the reengineered processes. Design/methodology/approach - The research approach used ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
SecCom: A prototype for integrating security-aware components
(
Springer Verlag
, 2009 , Conference Paper)
This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms
(
Nova Science Publishers, Inc.
, 2009 , Book chapter)
The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ...
Text summarization based on conceptual data classification
(
IGI Global
, 2008 , Book chapter)
In this paper, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic or ...
Highly accurate solutions of a laminar square duct flow in a transverse magnetic field with heat transfer using spectral method
(
The American Society of Mechanical Engineers (ASME)
, 2005 , Article)
A liquid metal forced-convection fully developed laminar flow inside a square duct, whose surfaces are electrically insulated and subjected to a constant temperature in a transverse magnetic field, is solved numerically ...