Sciweavers

8468 search results - page 1415 / 1694
» The Technology of Data Stashing
Sort
View
ICCSA
2004
Springer
15 years 4 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
ICSOC
2004
Springer
15 years 4 months ago
Hybrid web service composition: business processes meet business rules
Over the last few years several process-based web service composition languages have emerged, such as BPEL4WS and BPML. These languages define the composition on the basis of a pr...
Anis Charfi, Mira Mezini
ICWL
2004
Springer
15 years 4 months ago
CUBES: Providing Flexible Learning Environment for Virtual Universities
Abstract. To enable an online virtual university, a learning environment covering the entire spectrum of the learning and management process is required. However, constructing such...
Peifeng Xiang, Yuanchun Shi, Weijun Qin, Xin Xiang
IH
2004
Springer
15 years 4 months ago
Information Hiding in Finite State Machine
In this paper, we consider how to hide information into finite state machine (FSM), one of the popular computation models. The key advantage of hiding information in FSM is that t...
Lin Yuan, Gang Qu
LATIN
2004
Springer
15 years 4 months ago
Global Synchronization in Sensornets
Time synchronization is necessary in many distributed systems, but achieving synchronization in sensornets, which combine stringent precision requirements with severe resource con...
Jeremy Elson, Richard M. Karp, Christos H. Papadim...
« Prev « First page 1415 / 1694 Last » Next »