Sciweavers

1414 search results - page 255 / 283
» Combining Intruder Theories
Sort
View
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
MIR
2004
ACM
109views Multimedia» more  MIR 2004»
15 years 3 months ago
A web-enabled video indexing system
Video parsing and indexing is an important early stage of contentbased video analysis. In this paper, we present a new web-enabled video indexing system that integrates Synchroniz...
Jian Zhou, Xiao-Ping Zhang
MOBICOM
2004
ACM
15 years 3 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
NETGAMES
2004
ACM
15 years 3 months ago
Lightweight QoS-support for networked mobile gaming
In this paper, we present an approach to provide Quality of Service (QoS) for networked mobile gaming. In order to examine the QoS requirements of mobile games, we ported a simple...
Marcel Busse, Bernd Lamparter, Martin Mauve, Wolfg...
SAC
2004
ACM
15 years 3 months ago
An architecture for information retrieval over semi-collaborating Peer-to-Peer networks
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying net...
Iraklis A. Klampanos, Joemon M. Jose