Sciweavers

2120 search results - page 341 / 424
» Mapping the Gnutella Network
Sort
View
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
15 years 7 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
ESA
2009
Springer
92views Algorithms» more  ESA 2009»
15 years 7 months ago
Minimizing Movement: Fixed-Parameter Tractability
Abstract. We study an extensive class of movement minimization problems which arise from many practical scenarios but so far have little theoretical study. In general, these proble...
Erik D. Demaine, MohammadTaghi Hajiaghayi, D&aacut...
97
Voted
SLIP
2009
ACM
15 years 7 months ago
Closed-form solution for timing analysis of process variations on SWCNT interconnect
In this paper, a comprehensive and fast method is presented for the timing analysis of process variations on single-walled carbon nanotube (SWCNT) bundles. Unlike previous works t...
Peng Sun, Rong Luo
94
Voted
WOWMOM
2009
ACM
124views Multimedia» more  WOWMOM 2009»
15 years 7 months ago
VAPS: Positioning with spatial constraints
The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
102
Voted
AINA
2008
IEEE
15 years 7 months ago
VR BBS Using Immersive Virtual Environment
In this research, VR BBS was developed. In this system, a user can post a photograph with a comment from cellular phone. And the users can see and reply to the photograph and comm...
Satoshi Oonuki, Tetsuro Ogi