Sciweavers

2358 search results - page 380 / 472
» A Secure Pervasive Environment
Sort
View
CNSR
2006
IEEE
15 years 10 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
ESCIENCE
2006
IEEE
15 years 10 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Remote Voice Acquisition in Multimodal Surveillance
Multimodal surveillance systems using visible/IR cameras and other sensors are widely deployed today for security purpose, particularly when subjects are at a large distance. Howe...
Weihong Li, Zhigang Zhu, George Wolberg
150
Voted
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Hierarchical Load Testing Architecture using Large Scale Virtual Clients
In this work, we develop a hierarchical load testing architecture using large scale virtual clients to reduce the testing time and ensure the stability of the server for distribut...
Bum Lim, Jin Kim, Kwang Shim
IEEECIT
2006
IEEE
15 years 10 months ago
Multi-Agent based Data Integration in Real-world
This paper presents a Multi-Agent based Data Integration (MADI) framework for integrating distributed data source across Internet. This framework takes control on high-availabilit...
Yintang Dai, Shiyong Zhang