Sciweavers

131 search results - page 15 / 27
» Incorporating Trust in Network Virtualization
Sort
View
CORR
2010
Springer
153views Education» more  CORR 2010»
14 years 9 months ago
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the n...
P. Samundiswary, D. Sathian, P. Dananjayan
ACMACE
2009
ACM
15 years 4 months ago
Exposure effect on experience and visual perception in stereoscopic visual presentations
The advent of new technologies in cinema, theatre and virtual reality together with increasing demands for new content, are pushing the boundaries of filmmaking and storytelling t...
Wendy Ann Mansilla, Andrew Perkis, Touradj Ebrahim...
NETWORKING
2004
14 years 11 months ago
LMPS: Localized Multi-path Selection for QoS Routing in VoIP Networks
Abstract. Localized QoS routing techniques were proposed to achieve acceptable performance without exchanging global state information over the network. In such techniques, the ing...
Khaled M. F. Elsayed, Hassan Fadel, Amin M. Nassar
SPW
2004
Springer
15 years 3 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
DANCE
2002
IEEE
15 years 2 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...