Search
Now showing items 1-4 of 4
Context-Aware Stemming algorithm for semantically related root words
(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012)
There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are
flexible and adaptable for users. In this context, however, information retrieval (IR) is ...
A dependable model for attaining maximum authetication security procedure in a grid based environment
(Academic Journals Inc., 2012)
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer ...
Threats to e-government implementation in the civil service: Nigeria as a case study
(Akamai University, 2012)
The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is ...
Evaluating SMS parsing using automated testing software
(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012)
Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication.
Its enormous pervasiveness has created a great advantage for its use as a technological ...