Sciweavers

3061 search results - page 578 / 613
» Multicasting in Heterogeneous Networks
Sort
View
ADT
2010
15 years 18 days ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
CORR
2010
Springer
195views Education» more  CORR 2010»
15 years 17 days ago
Dynamic management of transactions in distributed real-time processing system
Managing the transactions in real time distributed computing system is not easy, as it has heterogeneously networked computers to solve a single problem. If a transaction runs acr...
Y. Jayanta Singh, Yumnam Somananda Singh, Ashok Ga...
113
Voted
CORR
2010
Springer
147views Education» more  CORR 2010»
15 years 16 days ago
Modeling the structure and evolution of discussion cascades
We analyze the structure and evolution of discussion cascades in four popular websites: Slashdot, Barrapunto, Meneame and Wikipedia. Despite the big heterogeneities between these ...
Vicenç Gómez, Hilbert J. Kappen, And...
138
Voted
GRID
2008
Springer
15 years 15 days ago
Cost and accuracy sensitive dynamic workflow composition over grid environments
A myriad of recent activities can be seen towards dynamic workflow composition for processing complex and data intensive problems. Meanwhile, the simultaneous emergence of the gri...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...
117
Voted
IJVR
2008
125views more  IJVR 2008»
15 years 14 days ago
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment
The Web3D technologies make it possible to create Collaborative Virtual Environment (CVE) in the popular Internet, thus promoting the popularity of CVE scientific applications to b...
Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, ...