Sciweavers

4445 search results - page 750 / 889
» Reflective Authorization Systems
Sort
View
ENTCS
2006
121views more  ENTCS 2006»
14 years 10 months ago
A Hierarchy of SOS Rule Formats
nary abstract) Jan Friso Groote 1 MohammadReza Mousavi 2 Michel A. Reniers 3 Department of Computer Science, Eindhoven University of Technology (TU/e), P.O. Box 513, NL-5600 MB Ein...
Jan Friso Groote, Mohammad Reza Mousavi, Michel A....
CG
2007
Springer
14 years 10 months ago
Visualizing and animating the winged-edge data structure
The winged- and half- edge data structures are commonly used representations for polyhedron models. Due to the complexity, students in an introductory to computer graphics course ...
Bryan Neperud, John L. Lowther, Ching-Kuang Shene
72
Voted
IJWIN
2008
126views more  IJWIN 2008»
14 years 10 months ago
IEEE 802.11 Load Balancing: An Approach for QoS Enhancement
Abstract. With the 802.11 WLAN multimedia applications (Video, Audio, realtime voice over IP,...) increasing, providing Quality of Service (QoS) support becomes very important sinc...
Issam Jabri, Nicolas Krommenacker, Thierry Divoux,...
87
Voted
CN
2007
172views more  CN 2007»
14 years 10 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
96
Voted
COMCOM
2007
139views more  COMCOM 2007»
14 years 10 months ago
Performance evaluation of scheduling in IEEE 802.16 based wireless mesh networks
IEEE 802.16 employs TDMA (Time Division Multiple Access) as the access method and the policy for selecting scheduled links in a given time slot will definitely impact the system ...
Bo Han, Weijia Jia, Lidong Lin