Sciweavers

619 search results - page 91 / 124
» On computational limitations of neural network architectures
Sort
View
ICDCSW
2003
IEEE
14 years 2 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
CGI
2004
IEEE
14 years 15 days ago
Adaptation Mechanism for Three Dimensional Content within the MPEG-21 Framework
The goal of the research is creation of an adaptation mechanism for the delivery of threedimensional content. The adaptation of content, for various network and terminal capabilit...
HyungSeok Kim, Chris Joslin, Thomas Di Giacomo, St...
MOBICOM
2005
ACM
14 years 2 months ago
Using mobile relays to prolong the lifetime of wireless sensor networks
In this paper we investigate the benefits of a heterogeneous architecture for wireless sensor networks composed of a few resource rich mobile nodes and a large number of simple s...
Wei Wang 0002, Vikram Srinivasan, Kee Chaing Chua
SENSYS
2009
ACM
14 years 3 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
MSWIM
2009
ACM
14 years 3 months ago
A performance evaluation framework for fair solutions in ad hoc networks
Fairness in multihop ad hoc networks has received considerable attention in the literature. Many schemes have been proposed, which attempt to compute the “optimal” bit rates o...
Manos Dramitinos, Rémi Vannier, Isabelle Gu...