Sciweavers

12697 search results - page 43 / 2540
» Call for Papers
Sort
View
OTM
2004
Springer
15 years 5 months ago
Design a High-Level Language for Large Network Security Management
A common breach of network security is the class of attacks called Worm-virus. This paper proposes a language called Triton whose goal is to efficiently and effectively safeguard ...
Jangha Kim, Byungwook Song, Kanghee Lee, Sangwook ...
VTC
2006
IEEE
15 years 5 months ago
A Relay Skipping Method for a Multi-Hop DS-CDMA Virtual Cellular Network
— A multi-hop virtual cellular network (VCN) was proposed for future mobile communication systems. In VCN, the transmitted signal from a mobile terminal is relayed via multi-hop ...
Lalla Soundous El Alami, Eisuke Kudoh, Fumiyuki Ad...
DEXAW
2004
IEEE
118views Database» more  DEXAW 2004»
15 years 3 months ago
LITO - A Logic For Indeterminate Temporal Objects
In order to obtain a suitable model of the universe of discourse of some information systems, it is important to allow the description of imprecise objects with temporal indetermi...
Ed Porto Bezerra, Ulrich Schiel, Bernardo Lula Jr.
LCN
2006
IEEE
15 years 5 months ago
Experimental investigation on VoIP performance and the resource utilization in 802.11b WLANs
In a shared medium network like the 802.11b WLAN, predicting the quality of VoIP calls from the resource usage of the wireless medium is highly desirable. Analyzing the bandwidth ...
Miroslaw Narbutt, Mark Davis
DGCI
2008
Springer
15 years 1 months ago
Gift-Wrapping Based Preimage Computation Algorithm
Based on a classical convex hull algorithm called Gift-Wrapping, the purpose of the paper is to provide a new algorithm for computing the vertices of a polytope called preimage - ...
Yan Gérard, Fabien Feschet, David Coeurjoll...