Sciweavers

912 search results - page 50 / 183
» An E-tutoring Service Architecture Based on Overlay Networks
Sort
View
ACSW
2007
14 years 11 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
IPPS
2007
IEEE
15 years 4 months ago
Shrack: Description and Performance Evaluation of a Peer-to-Peer System for Document Sharing and Tracking using Pull-Only Inform
Shrack is a peer-to-peer framework for document sharing and tracking. Shrack peers provide support to researchers in forming direct collaboration in autonomous sharing and keeping...
Hathai Tanta-ngai, Vlado Keselj, Evangelos E. Mili...
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
14 years 10 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 4 months ago
A QoS Architecture for IDMA-Based Multi-Service Wireless Networks
— The recent investigations on interleave-division multiple-access (IDMA) have demonstrated its advantage in supporting high-data-rate and multi-rate services over wireless fadin...
Qian Huang, Sammy Chan, King-Tim Ko, Li Ping, Peng...
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
15 years 4 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen