Sciweavers

2587 search results - page 471 / 518
» Intrusion Tolerant Systems
Sort
View
JISE
2007
98views more  JISE 2007»
14 years 11 months ago
Integrated Buffer and Route Management in a DTN with Message Ferry
Unlike normal wireless ad hoc networks, end-to-end connection may not exist in DTNs Thus, the Message Ferrying (MF) scheme has been proposed as a strategy for providing connectivi...
Mooi Choo Chuah, Wenbin Ma
CANDC
2002
ACM
14 years 11 months ago
A model for information technologies that can be creative
To contribute to HCI investigation and interface design that develops interactive systems for creative solutions, I attempt to formulate a model of the human capability to combine...
Johan F. Hoorn
CLUSTER
2002
IEEE
14 years 11 months ago
Location Selection for Active Services
Active services are application-specified programs that are executed inside the network. The location where the active service is executed plays an important role. The dynamic beha...
Roger Karrer, Thomas R. Gross
PE
2002
Springer
107views Optimization» more  PE 2002»
14 years 11 months ago
Multi-path continuous media streaming: what are the benefits?
Quality of service (QoS) in delivery of continuous media (CM) over the Internet is still relatively poor and inconsistent. Although many such applications can tolerate some degree...
Leana Golubchik, John C. S. Lui, Tak Fu Tung, Alix...
TON
1998
80views more  TON 1998»
14 years 11 months ago
Blocking and nonblocking multirate Clos switching networks
— This paper investigates in detail the blocking and nonblocking behavior of multirate Clos switching networks at the connection/virtual connection level. The results are applica...
Soung C. Liew, Ming-Hung Ng, Cathy W. Chan