Sciweavers

5324 search results - page 791 / 1065
» Internet Security Protocols
Sort
View
ICNP
2003
IEEE
14 years 4 months ago
Characterizing Overlay Multicast Networks
Overlay networks among cooperating hosts have recently emerged as a viable solution to several challenging problems, including multicasting, routing, content distribution, and pee...
Sonia Fahmy, Minseok Kwon
ACMICEC
2003
ACM
104views ECommerce» more  ACMICEC 2003»
14 years 4 months ago
Document exchange model for augmenting added value of B2B collaboration
In this paper we present a B2B integration project, which aims to augment the added value of services instead of improving efficiency by automating processes. This paper introduce...
Koichi Hayashi, Riichiro Mizoguchi
HICSS
2002
IEEE
122views Biometrics» more  HICSS 2002»
14 years 3 months ago
Democratic Participation in the Discursive Management of Usenet
Internet voting, sometimes proposed as a means of enhancing democratic participation, is partly inspired by the democratic process of newsgroup creation on Usenet. To better under...
John C. Paolillo, David Heald
ISCAS
2002
IEEE
93views Hardware» more  ISCAS 2002»
14 years 3 months ago
Real-time streaming for the animation of talking faces in multiuser environments
In order to enable face animation on the Internet using high quality synthetic speech, the Text-to-Speech (TTS) servers need to be implemented on network-based servers and shared ...
Jörn Ostermann, Jürgen Rurainsky, M. Reh...
SIGDOC
2009
ACM
14 years 3 months ago
User's issues in crossmedia applications
Technology allows users to interact with a wide variety of information and services. However, more and more users need to integrate complementary content to previously accessed in...
João Soares de Oliveira Neto, Nicolas Rouss...