Sciweavers

4218 search results - page 602 / 844
» Complete sets of cooperations
Sort
View
CW
2006
IEEE
14 years 4 months ago
Multi-User Networked Interactive Augmented Reality Card Game
Many efforts to improve interaction in virtual and augmented reality applications do so by including tactile elements to create a link between virtual objects and actions. It is a...
Marissa Díaz, Moises Alencastre-Miranda, Lo...
DSN
2006
IEEE
14 years 4 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim
GLOBECOM
2006
IEEE
14 years 4 months ago
Efficient transmission of MP3 streams over VPNs
— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
Shashank Khanvilkar, Ashfaq A. Khokhar
HICSS
2006
IEEE
149views Biometrics» more  HICSS 2006»
14 years 4 months ago
An Efficient Heuristic Search for Real-Time Frequent Pattern Mining
Real-time frequent pattern mining for business intelligence systems are currently in the focal area of research. In a number of areas of doing business, especially in the arena of...
Rajanish Dass, Ambuj Mahanti
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 4 months ago
Improving the Response Time of Business Processes: An Alert-Based Analytical Approach
Large enterprises in application domains such as finance, banking, travel services, and hospital management use business processes for their day-to-day business. An integral part ...
Eleanna Kafeza, Dickson K. W. Chiu, Kamalakar Karl...