Sciweavers

13101 search results - page 2587 / 2621
» Design and implementation of an
Sort
View
JCM
2006
77views more  JCM 2006»
13 years 8 months ago
Promote the Use of Explicit Delay Control
The Internet is undergoing changes of its traffic mix, with the IP-based interactive multimedia applications gaining momentum. According to studies, UDP-based multimedia traffic ha...
Xiaoyuan Gu, Dirk Markwardt, Lars C. Wolf
JUCS
2008
147views more  JUCS 2008»
13 years 8 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
JUCS
2008
161views more  JUCS 2008»
13 years 8 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
MAGS
2008
104views more  MAGS 2008»
13 years 8 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
MONET
2008
77views more  MONET 2008»
13 years 8 months ago
On Relay Node Placement and Assignment for Two-tiered Wireless Networks
Wireless networks that operate on batteries are imposed with energy constraints and long distance communications between nodes are not desirable. Implementing Relay Nodes (RNs) can...
Wenxuan Guo, Xin-Ming Huang, Wenjing Lou, Cao Lian...
« Prev « First page 2587 / 2621 Last » Next »