Sciweavers

7811 search results - page 1303 / 1563
» computing 2004
Sort
View
ISPA
2004
Springer
15 years 9 months ago
An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks
Abstract. In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper ...
Wei Lou, Jie Wu
ISW
2004
Springer
15 years 9 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
IWDC
2004
Springer
153views Communications» more  IWDC 2004»
15 years 9 months ago
APPLE: A Novel P2P Based e-Learning Environment
With the rapid development of information technology, dramatic changes have been taken place in the fundamental ways that people acquire and disseminate knowledge. Various e-Learni...
Hai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, J...
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 9 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
118
Voted
IWMM
2004
Springer
101views Hardware» more  IWMM 2004»
15 years 9 months ago
Region analysis and transformation for Java programs
This paper presents a region analysis and transformation framework for Java programs. Given an input Java program, the compiler automatically translates it into an equivalent outp...
Sigmund Cherem, Radu Rugina
« Prev « First page 1303 / 1563 Last » Next »