Sciweavers

4305 search results - page 779 / 861
» Analysing Protocol Implementations
Sort
View
CG
2005
Springer
15 years 2 months ago
Enhancing collaboration in virtual reality applications
We derive a complete component framework for transforming standalone VR applications into full-fledged multithreaded Collaborative Virtual Reality Environments (CVREs), after char...
Víctor Theoktisto, Marta Fairén Gonz...
TPDS
2008
115views more  TPDS 2008»
15 years 2 months ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung
JSW
2007
124views more  JSW 2007»
15 years 2 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
TWC
2008
156views more  TWC 2008»
15 years 2 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
MAGS
2007
82views more  MAGS 2007»
15 years 2 months ago
File transfer in Grid applications at deployment, execution and retrieval
In this article a three staged file transfer approach for the Grid is proposed. File transfer in the Grid can take place at three stages: deployment, user application execution, ...
Françoise Baude, Denis Caromel, Mario Leyto...