Sciweavers

1278 search results - page 137 / 256
» Architectures for Controller Based CDP
Sort
View
NETGAMES
2006
ACM
14 years 3 months ago
Hack-proof synchronization protocol for multi-player online games
Synchronization protocols based on “dead-reckoning” are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair advantages by essen...
Yeung Siu Fung
DEXAW
2003
IEEE
96views Database» more  DEXAW 2003»
14 years 2 months ago
Self-Organizing Resource Allocation for Autonomic Networks
Application-layer networks (ALN) are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual ...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
WSC
2000
13 years 10 months ago
A formation behavior for large-scale micro-robot force deployment
Micro-robots will soon be available for deployment by the thousands. Consequently, controlling and coordinating a force this large to accomplish a prescribed task is of great inte...
Donald D. Dudenhoeffer, Michael P. Jones
INTERWORKING
2000
14 years 19 days ago
Modelling and Performance Evaluation of a National Scale Switchless Based Network
In a packet switching based scenario, optical technologies can not completely overcome the problem of insufficient network capacity, due to limitations produced by the presence of ...
Josep Solé-Pareta, Davide Careglio, Salvato...
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 10 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu