Sciweavers

856 search results - page 72 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
WWW
2004
ACM
14 years 9 months ago
VersaTutor: architecture for a constraint-based intelligent tutor generator
Intelligent tutoring systems have demonstrated their utility in a variety of domains. However, they are notoriously resource intensive to build. We report here on the development ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
ICDCS
2007
IEEE
14 years 3 months ago
mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast
Application-layer overlay networks have recently emerged as a promising solution for live media multicast on the Internet. A tree is probably the most natural structure for a mult...
Feng Wang, Yongqiang Xiong, Jiangchuan Liu
CCS
2008
ACM
13 years 11 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
BROADNETS
2006
IEEE
14 years 3 months ago
Experimental Validation of Middleware-based QoS Control in 802.11 Wireless Networks
Due to the shared medium nature of wireless networks, the uncertainties caused by collisions and interferences make the Quality of Service (QoS) issue harder than its wired counte...
Wenbo He, Hoang Nguyen, Klara Nahrstedt
SACMAT
2004
ACM
14 years 2 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...