The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
World Wide Web is hosting huge information regarding lots of areas and education is not an exception. Given the huge amount of data, searching for any educational resource manually is very difficult. To overcome this, an intelligent repository of educational resources that helps to decide among the available resources is needed. This paper discusses an attempt to build such repository. This will help...
Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The Integration of the MANETs and infrastructure networks such as Internet extends the network coverage and increases the application domain of the MANET. Communication between a mobile device in an ad hoc network and a fixed device on the Internet is achieved using gateways, which acts as...
The validation of software metrics faces some degree of fuzziness in measure definitions, properties, and underlying assumptions, making the use of the measures difficult, their interpretation hazardous, and the results of the various validation studies somewhat contradictory. These characteristics do not imply that progress cannot be made in the measurement field. For this purpose metrics must be...
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms of injury. The multidisciplinary expertise needed for such reviews is not available at any one institution, resulting in the need for remote collaboration, while the sensitive nature of the information requires secure transmission...
This paper presents an evaluation methodology of quality characteristics of Web-applications using a broad, integrated, engineering-based approach. The authors have identified factors, sub-factors and metrics for the quality of e-commerce based Web-applications from userpsilas point of view. A small, controlled and well planned experiment is conducted in order to evaluate the quality characteristics...
Mobile clients need to access information anytime, anywhere from various legacy and existing applications on the wired network with minimum effort and cost. The challenge is to support pervasive information access to disparate data sources such as World Wide Web (WWW) and databases that can provide useful information to mobile clients without burdening the mobile device in terms of computation, storage,...
We state the discovery, threat posed, resolution of vulnerabilities analyzed and modus operandi of the mass attack implemented. Finally presented is a new idea currently being worked on, involving the use of cryptographic primitives that intend to bypass the theoretically naive "user-administrator" trust assumption as a novel attempt to mould into the upcoming DNS Security Extensions architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.