Sciweavers

1363 search results - page 92 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
AGTIVE
1999
Springer
15 years 7 months ago
Support for Design Patterns Through Graph Transformation Tools
A suitable software architecture –for example in the area of distributed application– can be composed of known-to-work solutions. These are also known as design patterns. Howev...
Ansgar Radermacher
DIGRA
2005
Springer
15 years 9 months ago
Architecting Scalability for Massively Multiplayer Online Gaming Experiences
In this study, the authors propose to discuss scalability challenges posed by Massively Multiplayer Online Game (MMOG) scenarios, while outlining issues specific to the context of...
Rui Gil, José Tavares, Licinio Roque
ESORICS
2004
Springer
15 years 8 months ago
Hindering Eavesdropping via IPv6 Opportunistic Encryption
This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynami...
Claude Castelluccia, Gabriel Montenegro, Julien La...
EUSFLAT
2001
116views Fuzzy Logic» more  EUSFLAT 2001»
15 years 4 months ago
Risk assessment in natural disasters with fuzzy probabilities
Risk assessment in regions with low earthquake activity is important for reinsurance companies and governmental building authorities. They need a complete picture of the possible ...
Uwe Wagner
MTA
2002
103views more  MTA 2002»
15 years 3 months ago
STEPS: Supporting Traditional Education Procedures-A TCP/IP Multimedia Networks-Based Model
This paper describes an integrated model for the realization of an Open and Distance Learning (ODL) environment supporting traditional learning procedures, through collaborative le...
Christos Bouras, Petros Lampsas, Paul G. Spirakis