Sciweavers

1368 search results - page 224 / 274
» Modeling the Telephone Call Network
Sort
View
SODA
2001
ACM
115views Algorithms» more  SODA 2001»
13 years 11 months ago
Loss-bounded analysis for differentiated services
We consider a network providing Differentiated Services (DiffServ) which allow network service providers to offer different levels of Quality of Service (QoS) to different traffic...
Alexander Kesselman, Yishay Mansour
WSCG
2000
97views more  WSCG 2000»
13 years 11 months ago
Human Movement Instruction System that Utilizes Avatar Overlays Using Stereoscopic Images
In the Mixed Reality environment that combines the real world and the virtual world it is important to control the 'place' that comprises both real and virtual objects. ...
Masayuki Ihara, Yoshihiro Shimada, Kenichi Kida, S...
ICDCSW
2007
IEEE
13 years 10 months ago
A Middleware Support for Agent-Based Application Mobility in Pervasive Environments
—Application mobility is an efficient way to mask uneven conditioning and reduce users’ distractions in pervasive environments. However, since mobility brings more dynamism and...
Yu Zhou, Jiannong Cao, Vaskar Raychoudhury, Joanna...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 10 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
DPD
1998
141views more  DPD 1998»
13 years 9 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...