Sciweavers

1974 search results - page 381 / 395
» Conditional Purchase Orders
Sort
View
IJNSEC
2006
162views more  IJNSEC 2006»
13 years 7 months ago
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Mobile ad-hoc wireless networks are established in improvised environments through the mutual cooperation of its participating nodes. These nodes often operate in a physically ins...
Asad Amir Pirzada, Chris McDonald
IJVR
2006
199views more  IJVR 2006»
13 years 7 months ago
Interactive Virtual Humans in Real-Time Virtual Environments
In this paper, we will present an overview of existing research in the vast area of IVH systems. We will also present our ongoing work on improving the expressive capabilities of I...
Nadia Magnenat-Thalmann, Arjan Egges
JCIT
2008
103views more  JCIT 2008»
13 years 7 months ago
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters
Firewall is a useful technique that ensures network security. Firewall examines network packets and determines whether to accept or deny them based on an ordered set of filters. I...
Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa T...
EAAI
2007
93views more  EAAI 2007»
13 years 7 months ago
Mining Pareto-optimal rules with respect to support and confirmation or support and anti-support
: In knowledge discovery and data mining many measures of interestingness have been proposed in order to measure the relevance and utility of the discovered patterns. Among these m...
Izabela Brzezinska, Salvatore Greco, Roman Slowins...
JMM2
2006
95views more  JMM2 2006»
13 years 7 months ago
Video Streaming over MBMS: A System Design Approach
Recently, Multimedia Broadcast Multicast Service (MBMS) has been specified by 3GPP as a Release 6 feature in order to meet the increasing demands of multimedia download and streami...
Junaid Afzal, Thomas Stockhammer, Tiago Gasiba, We...