Sciweavers

2947 search results - page 117 / 590
» The timely token protocol
Sort
View
VR
2009
IEEE
172views Virtual Reality» more  VR 2009»
15 years 11 months ago
Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays
How do users of virtual environments perceive virtual space? Many experiments have explored this question, but most of these have used head-mounted immersive displays. This paper ...
Eric Klein, J. Edward Swan II, Gregory S. Schmidt,...
ICNP
2007
IEEE
15 years 11 months ago
A Simple Model for Analyzing P2P Streaming Protocols
— P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well u...
Yipeng Zhou, Dah-Ming Chiu, John C. S. Lui
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
15 years 11 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
INFOCOM
2012
IEEE
13 years 7 months ago
SpeedBalance: Speed-scaling-aware optimal load balancing for green cellular networks
—This paper considers a component-level deceleration technique in BS operation, called speed-scaling, that is more conservative than entirely shutting down BSs, yet can conserve ...
Kyuho Son, Bhaskar Krishnamachari
HASE
1996
IEEE
15 years 9 months ago
Adaptive recovery for mobile environments
Mobile computing allows ubiquitous and continuousaccess to computing resources while the users travel or work at a client's site. The flexibility introduced by mobile computi...
Nuno Neves, W. Kent Fuchs