Sciweavers

17951 search results - page 3571 / 3591
» Network Coding Applications
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JNCA
2007
154views more  JNCA 2007»
13 years 8 months ago
Knowledge-based multimedia adaptation for ubiquitous multimedia consumption
Intelligent, server-side adaptation of multimedia resources is becoming increasingly important and challenging for two reasons. First, the market continuously brings up new mobile...
Dietmar Jannach, Klaus Leopold
JNW
2007
100views more  JNW 2007»
13 years 8 months ago
Towards a Novel Metadata Information Service for Distributed Data Management
— The trend in Grid computing towards more data intensive applications, accessing more and more relational databases and requiring advanced integration of secondhand and publicly...
Alexander Wöhrer, Peter Brezany
JPDC
2007
112views more  JPDC 2007»
13 years 8 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
AEI
2004
114views more  AEI 2004»
13 years 8 months ago
Physical concept ontology for the knowledge intensive engineering framework
Knowledge intensive engineering aims at flexible applications of a variety of product life cycle knowledge, such as design, manufacturing, operations, maintenance, and recycling. ...
Masaharu Yoshioka, Yasushi Umeda, Hideaki Takeda, ...
« Prev « First page 3571 / 3591 Last » Next »