Sciweavers

972 search results - page 21 / 195
» presence 2007
Sort
View
SEC
2004
14 years 10 months ago
Supporting End-to-end Security across Proxies with Multiple-Channel SSL
: Secure Socket Layer (SSL) has functional limitations that prevent end-to-end security in the presence of untrusted intermediary application proxies used by clients to communicate...
Yong Song, Victor C. M. Leung, Konstantin Beznosov
IJCAI
2003
14 years 10 months ago
Terminological Cycles in a Description Logic with Existential Restrictions
Cyclic definitions in description logics have until now been investigated only for description logics allowing for value restrictions. Even for the most basic language which allow...
Franz Baader
INFOCOM
2007
IEEE
15 years 3 months ago
Ad-hoc Localization in Urban District
Abstract— In this paper, we present a range-free ad-hoc localization algorithm called UPL (Urban Pedestrians Localization), for positioning mobile nodes in urban district. The de...
Akira Uchiyama, Sae Fujii, Kumiko Maeda, Takaaki U...
UCS
2007
Springer
15 years 3 months ago
A Media Access Protocol for Proactive Discovery in Ubiquitous Wireless Networks
A MAC protocol is proposed for proactive discovery in which wireless devices periodically broadcast packets containing presence or service information. The protocol is based on Fra...
Pavel Poupyrev, Peter Davis, Hiroyuki Morikawa
GECCO
2007
Springer
140views Optimization» more  GECCO 2007»
15 years 3 months ago
On the moments of the sampling distribution of particle swarm optimisers
A method is presented that allows one to exactly determine all the characteristics of a PSO’s sampling distribution and explain how it changes over time, in the presence stochas...
Riccardo Poli