Sciweavers

7741 search results - page 1444 / 1549
» Security in Active Networks
Sort
View
JSAC
2007
139views more  JSAC 2007»
15 years 4 months ago
Reverse-Engineering MAC: A Non-Cooperative Game Model
— This paper reverse-engineers backoff-based random-access MAC protocols in ad-hoc networks. We show that the contention resolution algorithm in such protocols is implicitly part...
Jang-Won Lee, Ao Tang, Jianwei Huang, Mung Chiang,...
JUCS
2007
133views more  JUCS 2007»
15 years 4 months ago
Building Immersive Conversation Environment Using Locomotive Interactive Character
: Generating composite human motion such as locomotion and gestures is important for interactive applications, such as interactive storytelling and computer games. In interactive s...
Rai Chan, Junichi Hoshino
CCR
2004
84views more  CCR 2004»
15 years 4 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
COMPUTER
2004
162views more  COMPUTER 2004»
15 years 4 months ago
Context-Aware Trails
The growth of ubiquitous computing has given rise to a range of possibilities for context-based application development. Technologies for mobile computing and context-awareness can...
Siobhán Clarke, Cormac Driver
CONCURRENCY
2000
101views more  CONCURRENCY 2000»
15 years 4 months ago
Wide-area parallel programming using the remote method invocation model
Java's support for parallel and distributed processing makes the language attractive for metacomputing applications, such as parallel applications that run on geographically ...
Rob van Nieuwpoort, Jason Maassen, Henri E. Bal, T...
« Prev « First page 1444 / 1549 Last » Next »