Sciweavers

4298 search results - page 651 / 860
» Computing at the top of the world
Sort
View
ICCSA
2005
Springer
15 years 7 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
INTETAIN
2005
Springer
15 years 7 months ago
Telepresence Techniques for Controlling Avatar Motion in First Person Games
First person games are computer games, in which the user experiences the virtual game world from an avatar’s view. This avatar is the user’s alter ego in the game. In this pape...
Henning Groenda, Fabian Nowak, Patrick Rö&szl...
JSSPP
2005
Springer
15 years 7 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
ICCSA
2005
Springer
15 years 7 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
ACMSE
2004
ACM
15 years 7 months ago
Topic-based clustering of news articles
Recent years have witnessed an explosion in the availability of news articles on the World Wide Web. Although searchengines’ algorithms have made it easier to locate these docum...
Najaf Ali Shah, Ehab M. ElBahesh