Sciweavers

6112 search results - page 1182 / 1223
» Programmable mobile networks
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 1 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 1 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
MMNS
2004
161views Multimedia» more  MMNS 2004»
15 years 1 months ago
Adaptive Video Streaming in Presence of Wireless Errors
Real-time video streaming with rate adaptation to network load/congestion represents an efficient solution to its coexistence with conventional TCP data services. Naturally, the st...
Guang Yang 0001, Mario Gerla, Medy Sanadidi
IADIS
2003
15 years 1 months ago
Personalization of Information Delivery by the Use of Agents
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
Jarogniew Rykowskia, Arkadiusz Juszkiewicz
WSCG
2004
165views more  WSCG 2004»
15 years 1 months ago
A Client-Server-Scenegraph for the Visualization of Large and Dynamic 3D Scenes
With the increasing capabilities of hardware for 3D graphics and network, 3D multi-user environments get more and more interesting for e-business, entertainment and cooperative wo...
Jörg Sahm, Ingo Soetebier
« Prev « First page 1182 / 1223 Last » Next »