Sciweavers

972 search results - page 151 / 195
» Simulation Using GPSS H
Sort
View
SUTC
2006
IEEE
15 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ACMACE
2006
ACM
15 years 3 months ago
AI-based world behaviour for emergent narratives
Research in Interactive Narrative has developed new approaches to the behaviour of virtual actors, but has dedicated little attention to the physical behaviour of the environment ...
Jean-Luc Lugrin, Marc Cavazza
ASSETS
2006
ACM
15 years 3 months ago
A Cisco education tool accessible to the vision impaired
This paper describes iNetSim, a universally accessible network simulator, created to allow vision-impaired and sighted users to complete Cisco Certified Network Associate level tw...
J. Hope, Brian R. von Konsky, I. Murray, L. C. Che...
MM
2006
ACM
99views Multimedia» more  MM 2006»
15 years 3 months ago
Reading the fine print: the effect of text legibility on perceived video quality in mobile tv
Mobile TV services are available in an increasing number of countries. For cost reasons, most of these services offer material directly recoded for mobile consumption (i.e. withou...
Hendrik Knoche, John D. McCarthy, Martina Angela S...
SIGIR
2006
ACM
15 years 3 months ago
On-line spam filter fusion
We show that a set of independently developed spam filters may be combined in simple ways to provide substantially better filtering than any of the individual filters. The resu...
Thomas R. Lynam, Gordon V. Cormack, David R. Cheri...