Sciweavers

4983 search results - page 150 / 997
» order 2008
Sort
View
WICON
2008
15 years 2 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...
WSR
2008
15 years 2 months ago
Graph Technology in Reverse Engineering: The TGraph Approach
: TGraphs are directed graphs with typed, attributed, and ordered nodes and edges. These properties leverage the use of graphs as models for all kinds of artifacts in the context o...
Jürgen Ebert, Volker Riediger, Andreas Winter
CIC
2004
143views Communications» more  CIC 2004»
15 years 2 months ago
TCP Vegas-like Algorithm for Layered multicast Transmission
Layered multicast is probably the most elegant solution to tackle the heterogene ity problem in multicast delivery of real-time multimedia streams. However, the multiple join expe...
Omar Ait-Hellal, Guy Leduc
IADIS
2004
15 years 2 months ago
Business models for hotspot an exploratory study
We analyze the literature in order to clarify the concept of business model and to identify hotspots business models. Based in those models an in a set of interviews we produced a...
Carlos J. Costa, Manuela Aparicio
IADIS
2004
15 years 2 months ago
National Center of Eco-Business Management CENABIO
This paper describes CENABIO - National Center of Eco-business Management, powered by an intelligent system to support eco-business (SISBIO). By using Artificial Intelligence and ...
Filipe Corrêa da Costa, Hugo Cesar Hoeschl, ...