Sciweavers

5435 search results - page 28 / 1087
» Informed Detection Revisited
Sort
View
ASE
2005
96views more  ASE 2005»
13 years 9 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
WWW
2008
ACM
14 years 10 months ago
Anycast CDNS revisited
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...
IH
2007
Springer
14 years 3 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
DIGRA
2003
Springer
14 years 3 months ago
"This isn't a computer game you know!": revisiting the computer games/televised war analogy
During the Gulf War of 1991, the television coverage was frequently observed to be ‘just like a video game’. This analogy primarily derived from the specific, ‘bombs-eye’ ...
Melanie Swalwell
VRST
2010
ACM
13 years 7 months ago
Shake-your-head: revisiting walking-in-place for desktop virtual reality
The Walking-In-Place interaction technique was introduced to navigate infinitely in 3D virtual worlds by walking in place in the real world. The technique has been initially devel...
Léo Terziman, Maud Marchal, Mathieu Emily, ...