Sciweavers

537 search results - page 4 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
CHI
2009
ACM
14 years 8 months ago
Difficulties in establishing common ground in multiparty groups using machine translation
When people communicate in their native languages using machine translation, they face various problems in constructing common ground. This study investigates the difficulties of ...
Naomi Yamashita, Rieko Inaba, Hideaki Kuzuoka, Tor...
JMM
2007
107views more  JMM 2007»
13 years 7 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
PODC
2005
ACM
14 years 29 days ago
On the establishment of distinct identities in overlay networks
Abstract We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible ...
Rida A. Bazzi, Goran Konjevod
AIME
2001
Springer
13 years 12 months ago
Using Critiquing for Improving Medical Protocols: Harder than It Seems
Medical protocols are widely recognised to provide clinicians with high-quality and up-to-date recommendations. A critical condition for this is of course that the protocols themse...
Mar Marcos, Geert Berger, Frank van Harmelen, Anne...
CONEXT
2007
ACM
13 years 11 months ago
Exploring the routing complexity of mobile multicast: a semi-empirical study
Protocol extensions for a mobile Internet have been developed within the IETF, but a standard design of mobile multicast is still awaited. Multicast routing, when adapting its dis...
Matthias Wählisch, Thomas C. Schmidt