Sciweavers

5324 search results - page 829 / 1065
» Internet Security Protocols
Sort
View
UML
2001
Springer
14 years 2 months ago
Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study
: There are many different ways to specify the requirements of complex software systems, and the optimal methods often vary according to the problem domain. We apply and compare tw...
Geri Georg, Jores Bieman, Robert B. France
ICMCS
2000
IEEE
80views Multimedia» more  ICMCS 2000»
14 years 2 months ago
LDA+: A TCP-Friendly Adaptation Scheme for Multimedia Communication
— In this paper, we present an end-to-end adaptation scheme, called the enhanced loss-delay based adaptation algorithm (LDA+), for regulating the transmission behavior of multime...
Dorgham Sisalem, Adam Wolisz
ICMCS
2000
IEEE
70views Multimedia» more  ICMCS 2000»
14 years 2 months ago
On TCP-Friendly Video Transfer with Consideration on Application-Level QoS
When both TCP and UDP sessions co-exist in the Internet, the performance of TCP sessions easily deteriorate because of congestion incurred by UDP sessions of real-time multimedia ...
Naoki Wakamiya, Masayuki Murata, Hideo Miyahara
ISWC
1999
IEEE
14 years 2 months ago
Virtual Information Towers-A Metaphor for Intuitive, Location-Aware Information Access in a Mobile Environment
This paper introduces Virtual Information Towers (VITs) as a concept for presenting and accessing location-aware information with mobile clients. A VIT is a means of structuring l...
Alexander Leonhardi, Uwe Kubach, Kurt Rothermel, A...
WECWIS
1999
IEEE
97views ECommerce» more  WECWIS 1999»
14 years 2 months ago
Speechnet: A Network of Hyperlinked Speech-Accessible Objects
The dominant technology for electronic communication and commerce, the telephone, does not discriminate between sighted and non-sighted users. The web does discriminate. The web i...
Richard A. Frost