Sciweavers

ICDCSW
2000
IEEE
13 years 8 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
ICDCSW
2000
IEEE
13 years 8 months ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen
ICDCSW
2000
IEEE
13 years 9 months ago
A Link Availability Prediction Model for Wireless Ad Hoc Networks
Dajiang He, Shengming Jiang, Jianqiang Rao
ICDCSW
2000
IEEE
13 years 9 months ago
Adding Mobility to Non-Mobile Web Robots
In this paper we will show that it is possible to combine mobile agent technology with existing non-mobile data mining applications. The motivation for this is the advantage mobil...
Nils P. Sudmann, Dag Johansen
ICDCSW
2000
IEEE
13 years 9 months ago
Fisheye State Routing in Mobile Ad Hoc Networks
In this paper, we present a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce ...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
ICDCSW
2000
IEEE
13 years 9 months ago
Adaptive Real-Time Monitoring Mechanism for Replicated Distributed Video Player Systems
One of the main problems to ensure the quality of services (QoS) in video playback in a replicated distributed video player system is how to adapt to the changing network traffic ...
Chris C. H. Ngan, Kam-yiu Lam, Edward Chan
ICDCSW
2000
IEEE
13 years 9 months ago
Flexible Secure Multicasting in Active Networks
Zhaoyu Liu, Roy H. Campbell, Sudha K. Varadarjan, ...
ICDCSW
2000
IEEE
13 years 9 months ago
Integrating XML Data with Relational Databases
Wang-Chien Lee, Gail Mitchell, Xin Zhang
ICDCSW
2000
IEEE
13 years 9 months ago
Model-Based Multi-Modal Information Retrieval from Large Archives
In this paper, we describe a new paradigm for information retrieval in which the retrieval target is based on a model. Three types of models – linear, finite state, and knowledg...
Chung-Sheng Li, Yuan-Chi Chang, Lawrence D. Bergma...