Sciweavers

5752 search results - page 222 / 1151
» Informative Labeling Schemes
Sort
View
142
Voted
ICOIN
2005
Springer
15 years 9 months ago
S-RO: Simple Route Optimization Scheme with NEMO Transparency
Network mobility (NEMO) basic support protocol maintains the connectivity when mobile router (MR) changes its point of attachment to the Internet by establishing a bidirectional tu...
Hanlim Kim, Geunhyung Kim, Cheeha Kim
WAC
2004
Springer
122views Communications» more  WAC 2004»
15 years 9 months ago
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme
In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. Like other distributed trust management sy...
Anurag Garg, Roberto Battiti, Gianni Costanzi
ISCIS
2003
Springer
15 years 9 months ago
Virtual Interval Caching Scheme for Interactive Multimedia Streaming Workload
Abstract. We carefully believe that server workload for interactive multimedia service exhibits different characteristics from legacy application, e.g. ftp server, web server, ASP...
Kyoungwoon Cho, Yeonseung Ryu, Youjip Won, Kern Ko...
DAS
2010
Springer
15 years 8 months ago
A post-processing scheme for malayalam using statistical sub-character language models
Most of the Indian scripts do not have any robust commercial OCRs. Many of the laboratory prototypes report reasonable results at recognition/classification stage. However, word ...
Karthika Mohan, C. V. Jawahar
117
Voted
ISICT
2004
15 years 5 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang