Sciweavers

826 search results - page 39 / 166
» A Virtual World for Network Management
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
NETGAMES
2004
ACM
14 years 2 months ago
Scalable peer-to-peer networked virtual environment
We propose a fully-distributed peer-to-peer architecture to solve the scalability problem of Networked Virtual Environment in a simple and efficient manner. Our method exploits lo...
Shun-Yun Hu, Guan-Ming Liao
EMISA
2004
Springer
14 years 2 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
GI
2005
Springer
14 years 2 months ago
RFID middleware design - addressing both application needs and RFID constraints
: Radio Frequency Identification (RFID) technology has a lot of potential to bridge the gap between the virtual world of enterprise IT systems and the real world of products and l...
Christian Floerkemeier, Matthias Lampe
HAPTICS
2009
IEEE
14 years 3 months ago
Collaborative haptic environment assessment
Collaborative virtual environments (CVE) allow users from different geographical locations to execute a shared task by acting upon the same entities in the virtual world. Most of ...
Felix G. Hamza-Lup, Benjamin M. Lambeth, James LaP...