Sciweavers

1080 search results - page 141 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ECAL
2007
Springer
15 years 4 months ago
Evolution of Acoustic Communication Between Two Cooperating Robots
In this paper we describe a model in which artificial evolution is employed to design neural mechanisms that control the motion of two autonomous robots required to communicate th...
Elio Tuci, Christos Ampatzis
WETICE
2006
IEEE
15 years 3 months ago
A Trust-enabled P2P Recommender System
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
Georgios Pitsilis, Lindsay Marshall
AINA
2005
IEEE
15 years 3 months ago
A Technical Comparison of IPSec and SSL
IPSec (IP Security) and SSL (Secure Socket Layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL ha...
AbdelNasir Alshamsi, Takamichi Saito
ICSOC
2005
Springer
15 years 3 months ago
Demonstrating Dynamic Configuration and Execution of Web Processes
Web processes are next generation workflows on the web, created using Web services. In this paper we demonstrate the METEOR-S Configuration and Execution Environment (MCEE1 ) syste...
Karthik Gomadam, Kunal Verma, Amit P. Sheth, John ...
ECRA
2006
77views more  ECRA 2006»
14 years 9 months ago
An empirical study of Web browsing behaviour: Towards an effective Website design
Prior studies have suggested that a good Website design which facilitates a user's Web browsing behaviour would generally lead to better user performance. In this research, w...
Gek Woo Tan, Kwok Kee Wei