Sciweavers

6757 search results - page 1242 / 1352
» Knowledge Analysis on Process Models
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
Real-World VANET Security Protocol Performance
—Many results have been published in the literature based on performance measurements obtained from simulations of Vehicular Networks (VANETs). These simulations use as input tra...
Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux
ICNP
2009
IEEE
15 years 4 months ago
EMS: Encoded Multipath Streaming for Real-time Live Streaming Applications
Abstract—Multipath streaming protocols have recently attracted much attention because they provide an effective means to provide high-quality streaming over the Internet. However...
Alix L. H. Chow, Hao Yang, Cathy H. Xia, Minkyong ...
LADC
2007
Springer
15 years 4 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
DASFAA
2005
IEEE
157views Database» more  DASFAA 2005»
15 years 3 months ago
Adaptively Detecting Aggregation Bursts in Data Streams
Finding bursts in data streams is attracting much attention in research community due to its broad applications. Existing burst detection methods suffer the problems that 1) the p...
Aoying Zhou, Shouke Qin, Weining Qian
CVRMED
1997
Springer
15 years 2 months ago
Design considerations for a computer-vision-enabled ophthalmic augmented reality environment
We have initiated studies towards the design and implementation of an ophthalmic augmented reality environment in order to allow for a more precise laser treatment for ophthalmic...
Jeffrey W. Berger, Michael E. Leventon, Nobuhiko H...
« Prev « First page 1242 / 1352 Last » Next »