Sciweavers

5722 search results - page 886 / 1145
» Security Function Interactions
Sort
View
GLOBECOM
2008
IEEE
15 years 10 months ago
MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet
— Naming and addressing are important issues for Next Generation Internet (NGI). In this paper, we discuss a new Mobility and Multihoming supporting Identifier Locator Split Arch...
Jianli Pan, Subharthi Paul, Raj Jain, Mic Bowman
INFOCOM
2008
IEEE
15 years 10 months ago
Optimization Based Rate Control for Communication Networks with Inter-Session Network Coding
—In this paper we develop a distributed rate control algorithm for multiple-unicast-sessions when network coding is allowed. Building on our recent flow-based characterization o...
Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff
LAWEB
2008
IEEE
15 years 10 months ago
Personal Information Ecosystems: Design Concerns for Net-Enabled Devices
Today, with the proliferation of affordable computing, people use multiple devices to fulfill their information needs. Designers approach each device platform individually, with...
Manuel A. Pérez-Quiñones, Manas Tung...
PG
2007
IEEE
15 years 10 months ago
Explicit Control of Vector Field Based Shape Deformations
Vector Field Based Shape Deformations (VFSD) have been introduced as an efficient method to deform shapes in a volume-preserving foldover-free manner. However, mainly simple impl...
Wolfram von Funck, Holger Theisel, Hans-Peter Seid...
QSIC
2007
IEEE
15 years 10 months ago
An Incremental and FCA-Based Ontology Construction Method for Semantics-Based Component Retrieval
In semantics-based component retrieval ontology is usually employed as the semantic basis for component representation and matching. Existing methods always assume that the ontolo...
Xin Peng, Wenyun Zhao