Sciweavers

165 search results - page 16 / 33
» Conversational Model Based VoIP Traffic Generation
Sort
View
IJDSN
2006
136views more  IJDSN 2006»
13 years 8 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
ATAL
2008
Springer
13 years 10 months ago
A 'companion' ECA with planning and activity modelling
In this paper, we describe the development of an Embodied Conversational Agent (ECA) implementing the concept of a companion, i.e. an agent supporting the persistent representatio...
Marc Cavazza, Cameron Smith, Daniel Charlton, Li Z...
DEXA
2003
Springer
146views Database» more  DEXA 2003»
14 years 1 months ago
An Access Time Cost Model for Spatial Range Queries on Broadcast Geographical Data over Air
Wireless data broadcasting is well known for its excellent scalability. Most geographical data, such as weather and traffic, is public information and has a large number of potenti...
Jianting Zhang, Le Gruenwald
ER
2003
Springer
550views Database» more  ER 2003»
14 years 1 months ago
A UML Based Approach for Modeling ETL Processes in Data Warehouses
Data warehouses (DWs) are complex computer systems whose main goal is to facilitate the decision making process of knowledge workers. ETL (Extraction-Transformation-Loading) proces...
Juan Trujillo, Sergio Luján-Mora
DSRT
2005
IEEE
14 years 2 months ago
Exploring the Use of Local Consistency Measures as Thresholds for Dead Reckoning Update Packet Generation
Human-to-human interaction across distributed applications requires that sufficient consistency be maintained among participants in the face of network characteristics such as lat...
David J. Roberts, Damien Marshall, Rob Aspin, S&ea...