Sciweavers

897 search results - page 136 / 180
» History-based traffic control
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 11 months ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar
IJNSEC
2006
88views more  IJNSEC 2006»
14 years 11 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
IJAMC
2007
152views more  IJAMC 2007»
14 years 11 months ago
Navigating a 3D virtual environment of learning objects by hand gestures
: This paper presents a gesture-based Human-Computer Interface (HCI) to navigate a learning object repository mapped in a 3D virtual environment. With this interface, the user can ...
Qing Chen, Abu Saleh Md. Mahfujur Rahman, Xiaojun ...
PE
2002
Springer
176views Optimization» more  PE 2002»
14 years 10 months ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
ISSRE
2010
IEEE
14 years 9 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...