Sciweavers

15782 search results - page 2904 / 3157
» Network Optimization and Control
Sort
View
IJNSEC
2006
89views more  IJNSEC 2006»
15 years 4 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
JBI
2006
105views Bioinformatics» more  JBI 2006»
15 years 4 months ago
User modeling and adaptation in health promotion dialogs with an animated character
In this paper, we describe our experience with the design and implementation of an embodied conversational agent (ECA) that converses with users in order to change their dietary b...
Fiorella de Rosis, Nicole Novielli, Valeria Carofi...
JCM
2006
85views more  JCM 2006»
15 years 4 months ago
Round-trip Time Variation in SmoothTCP in the Face of Spurious Errors
In this paper, we review the definition of a variant of TCP, called SmoothTCP, and describe one of its versions which uses ICMP-SQ messages as its primary control metric. This vers...
Elvis Vieira, Michael Bauer
JCM
2006
92views more  JCM 2006»
15 years 4 months ago
Ultimate Dynamic Spectrum Allocation via User-Central Wireless Systems
- Current wireless systems are called vendor-central systems because, users should subscribe to a service provider (vendor) and receive the service through the spectrum assigned to...
Seyed Alireza Zekavat, Xiukui Li
JSW
2008
101views more  JSW 2008»
15 years 4 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
« Prev « First page 2904 / 3157 Last » Next »