Sciweavers

5324 search results - page 817 / 1065
» Internet Security Protocols
Sort
View
VRML
1999
ACM
14 years 3 months ago
An Open Virtual Environment for Autonomous Agents Using VRML and Java
We describe a VRML/Java-based virtual environment that is populated with heterogeneous articulated agents. In this simulated environment, agents compete for collecting certain obj...
Bernhard Jung, Jan-Torsten Milde
HT
2007
ACM
14 years 2 months ago
What is an analogue for the semantic web and why is having one important?
This paper postulates that for the Semantic Web to grow and gain input from fields that will surely benefit it, it needs to develop an analogue that will help people not only unde...
m. c. schraefel
APWEB
2006
Springer
14 years 2 months ago
A Statistical Study of Today's Gnutella
Abstract. As a developing P2P system, Gnutella has upgraded its protocol to 0.6, which significantly changed the characteristics of its hosts. However, few previous work has given ...
Shicong Meng, Cong Shi, Dingyi Han, Xing Zhu, Yong...
ECOWS
2006
Springer
14 years 2 months ago
Maintaining Consistency between Loosely Coupled Services in the Presence of Timing Constraints and Validation Errors
Loose coupling is often cited as a defining characteristic of service-oriented architectures. Interactions between services take place via messages in an asynchronous environment ...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
QOFIS
2000
Springer
14 years 2 months ago
The Direct Adjustment Algorithm: A TCP-Friendly Adaptation Scheme
Many distributed multimedia applications have the ability to adapt to uctuations in the network conditions. By adjusting temporal and spatial quality to available bandwidth, or man...
Dorgham Sisalem, Henning Schulzrinne