Sciweavers

4286 search results - page 806 / 858
» Formalizing Service Interactions
Sort
View
CN
2006
79views more  CN 2006»
15 years 2 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
IJNM
2006
175views more  IJNM 2006»
15 years 2 months ago
An OPNET-based simulation approach for deploying VoIP
These days a massive deployment of VoIP is taking place over IP networks. VoIP deployment is a challenging task for network researchers and engineers. This paper presents a detaile...
Khaled Salah, A. Alkhoraidly
IJFCS
2007
105views more  IJFCS 2007»
15 years 2 months ago
On the Existence of Lookahead Delegators for NFA
We investigate deterministically simulating (i.e., solving the membership problem for) nondeterministic finite automata (NFA), relying solely on the NFA’s resources (states and...
Bala Ravikumar, Nicolae Santean
142
Voted
WINET
2002
144views more  WINET 2002»
15 years 2 months ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
SCFBM
2008
101views more  SCFBM 2008»
15 years 2 months ago
The MERG Suite: Tools for discovering competencies and associated learning resources
Background: As the demands for competency-based education grow, the need for standardsbased tools to allow for publishing and discovery of competency-based learning content is mor...
Ravi Teja Bhupatiraju, William R. Hersh, Valerie S...