Sciweavers

6031 search results - page 1085 / 1207
» Communicating Transaction Processes
Sort
View
CN
2007
148views more  CN 2007»
15 years 3 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
131
Voted
ISCI
2008
120views more  ISCI 2008»
15 years 3 months ago
Using cooperative mobile agents to monitor distributed and dynamic environments
Monitoring the changes in data values obtained from the environment (e.g., locations of moving objects) is a primary concern in many fields, as for example in the pervasive comput...
Sergio Ilarri, Eduardo Mena, Arantza Illarramendi
117
Voted
IJDAR
2006
102views more  IJDAR 2006»
15 years 3 months ago
Table form document analysis based on the document structure grammar
Structure analysis of table form documents is an important issue because a printed document and even an electronic document do not provide logical structural information but merely...
Akira Amano, Naoki Asada, Masayuki Mukunoki, Masah...
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 3 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
142
Voted
IJSN
2006
140views more  IJSN 2006»
15 years 3 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
« Prev « First page 1085 / 1207 Last » Next »