Sciweavers

620 search results - page 53 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
JCIT
2010
197views more  JCIT 2010»
14 years 4 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
SIAMNUM
2010
99views more  SIAMNUM 2010»
14 years 4 months ago
Analysis and Optimization of Robin-Robin Partitioned Procedures in Fluid-Structure Interaction Problems
In the solution of Fluid-Structure Interaction problems, partitioned procedures are modular algorithms that involve separate fluid and structure solvers, that interact, in an itera...
Luca Gerardo-Giorda, Fabio Nobile, Christian Verga...
AINA
2006
IEEE
15 years 3 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
SAC
2003
ACM
15 years 3 months ago
Organizational Modeling in UML and XML in the Context of Workflow Systems
Workflow technology plays a key role as an enabler in E-Commerce applications, such as supply chains. Until recently the major share of the attention of workflow systems researche...
Wil M. P. van der Aalst, Akhil Kumar, H. M. W. (Er...
HCI
2007
14 years 11 months ago
Use of Chinese Short Messages
Short text message (SMS) as a key communication means in China received a lot of attention in research community. 114 subjects attended the study, sharing totally 10843 SMS they se...
Dafei Ma, Fumiko Ichikawa, Ying Liu, Li Jiang