Sciweavers

507 search results - page 88 / 102
» The relation between protocols and games
Sort
View
JCM
2008
86views more  JCM 2008»
14 years 9 months ago
IPv6 over IEEE 802.16 (WiMAX) Networks: Facts and Challenges
Deploying the new generation "Internet Protocol" (IPv6) over 802.16-based wireless networks is facing an important challenge as the IEEE 802.16 standard is failing to sup...
Adlen Ksentini
ISF
2007
84views more  ISF 2007»
14 years 9 months ago
Guided interaction: A mechanism to enable ad hoc service interaction
Ad hoc interaction between web services and their clients is a worthwhile but seemingly distant goal. This paper presents guided interaction as an alternative to the current mecha...
Phillipa Oaks, Arthur H. M. ter Hofstede
TIT
2008
147views more  TIT 2008»
14 years 9 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
TPDS
2008
130views more  TPDS 2008»
14 years 9 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
JUCS
2007
95views more  JUCS 2007»
14 years 9 months ago
A First Step Mapping IMS Learning Design and Moodle
: Mapping the specification IMS Learning Design and the Course Management System Moodle is a logical step forward on interoperability between eLearning systems and specifications i...
Daniel Burgos, Colin Tattersall, Martin Dougiamas,...