Sciweavers

4218 search results - page 602 / 844
» Complete sets of cooperations
Sort
View
CW
2006
IEEE
15 years 10 months ago
Multi-User Networked Interactive Augmented Reality Card Game
Many efforts to improve interaction in virtual and augmented reality applications do so by including tactile elements to create a link between virtual objects and actions. It is a...
Marissa Díaz, Moises Alencastre-Miranda, Lo...
DSN
2006
IEEE
15 years 10 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
116
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
Efficient transmission of MP3 streams over VPNs
— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
Shashank Khanvilkar, Ashfaq A. Khokhar
HICSS
2006
IEEE
149views Biometrics» more  HICSS 2006»
15 years 10 months ago
An Efficient Heuristic Search for Real-Time Frequent Pattern Mining
Real-time frequent pattern mining for business intelligence systems are currently in the focal area of research. In a number of areas of doing business, especially in the arena of...
Rajanish Dass, Ambuj Mahanti
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 10 months ago
Improving the Response Time of Business Processes: An Alert-Based Analytical Approach
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...