Sciweavers

1757 search results - page 268 / 352
» Secure Content Validation
Sort
View
WISE
2008
Springer
15 years 5 months ago
Bill Organiser Portal: A Case Study on End-User Composition
Abstract. Whilst Web services can be composed by technical developers using a language such as BPEL, there is no easy way for non-technical end users to take advantage of these ser...
Agnes Ro, Lily Shu-Yi Xia, Hye-Young Paik, Chea Hy...
BROADNETS
2007
IEEE
15 years 5 months ago
Modeling and performance analysis of an improved DCF-based mechanism under noisy channel
The ISM free-licence band is highly used by wireless technologies such IEEE 802.11, Bluetooth as well as private wireless schemes. This huge utilisation increases dramatically the ...
Adlen Ksentini, Marc Ibrahim
GLOBECOM
2007
IEEE
15 years 5 months ago
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
— In distributed wireless access networks, the short-term unfairness of IEEE 802.11 Distributed Coordination Function (DCF) has been revealed by many works. In this paper, a modi...
Xiaohui Ye, Xin Liu, S. J. Ben Yoo, Zhi Ding
ICCV
2007
IEEE
15 years 5 months ago
Toward a Theory of Shape from Specular Flow
The image of a curved, specular (mirror-like) surface is a distorted reflection of the environment. The goal of our work is to develop a framework for recovering general shape fr...
Yair Adato, Yuriy Vasilyev, Ohad Ben-Shahar, Todd ...
ICDCS
2007
IEEE
15 years 5 months ago
A Multiphased Approach for Modeling and Analysis of the BitTorrent Protocol
BitTorrent is one of the most popular protocols for content distribution and accounts for more than 15% of the total Internet traffic. In this paper, we present an analytical mod...
Vivek Rai, Swaminathan Sivasubramanian, Sandjai Bh...