Sciweavers

1647 search results - page 84 / 330
» Distributing private data in challenged network environments
Sort
View
CSCW
2006
ACM
15 years 3 months ago
Scientific Data Collections and Distributed Collective Practice
As the basic sciences become increasingly information-intensive, the management and use of research data presents new challenges in the collective activities that constitute schola...
Melissa H. Cragin, Kalpana Shankar
ACSC
2004
IEEE
15 years 7 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
ICDCS
2010
IEEE
15 years 7 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
VRST
2003
ACM
15 years 9 months ago
Tele-sports and tele-dance: full-body network interaction
Researchers have had great success using motion capture tools for controlling avatars in virtual worlds. Another current of virtual reality research has focused on building collab...
Benjamin Schaeffer, Mark Flider, Hank Kaczmarski, ...
ADHOC
2005
84views more  ADHOC 2005»
15 years 3 months ago
Infrastructure-based MAC in wireless mobile ad-hoc networks
- The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Func...
Hossam S. Hassanein, Tiantong You, Hussein T. Mouf...