Sciweavers

1988 search results - page 302 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
DFN
2003
13 years 10 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
ICDCS
2009
IEEE
14 years 6 months ago
Down the Block and Around the Corner The Impact of Radio Propagation on Inter-vehicle Wireless Communication
Vehicular networks are emerging as a new distributed system environment with myriad possible applications. Most studies on vehicular networks are carried out via simulation, given...
John S. Otto, Fabián E. Bustamante, Randall...
PERCOM
2006
ACM
14 years 8 months ago
A Collaborative Web Browsing System for Multiple Mobile Users
In mobile computing environments, handheld devices with low functionality restrict the services provided for mobile users. We propose a new concept of collaborative browsing, wher...
Takuya Maekawa, Takahiro Hara, Shojiro Nishio
CVPR
2008
IEEE
14 years 11 months ago
A bi-illuminant dichromatic reflection model for understanding images
This paper presents a new model for understanding the appearance of objects that exhibit both body and surface reflection under realistic illumination. Specifically, the model rep...
Bruce A. Maxwell, Richard M. Friedhoff, Casey A. S...
ADBIS
2000
Springer
166views Database» more  ADBIS 2000»
14 years 1 months ago
Integrating Bibliographical Data from Heterogeneous Digital Libraries
The integration of bibliographical data today is considered one of the most important tasks in the area of digital libraries. Various available sources of bibliographical informati...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler