Sciweavers

11234 search results - page 1930 / 2247
» A Microsurgery Simulation System
Sort
View
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
SMA
2005
ACM
104views Solid Modeling» more  SMA 2005»
15 years 9 months ago
Packing a trunk: now with a twist!
In an industry project with a German car manufacturer we are faced with the challenge of placing a maximum number of uniform rigid rectangular boxes in the interior of a car trunk...
Friedrich Eisenbrand, Stefan Funke, Andreas Karren...
VRST
2005
ACM
15 years 9 months ago
Human performance in space telerobotic manipulation
This paper considers the utility of VR in the design of the interface to a space-based telerobotic manipulator. An experiment was conducted to evaluate the potential for improved ...
Philip Lamb, Dean Owen
203
Voted
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
« Prev « First page 1930 / 2247 Last » Next »