Sciweavers

4248 search results - page 808 / 850
» Simulating hci for all
Sort
View
IJNSEC
2008
124views more  IJNSEC 2008»
13 years 11 months ago
Scalable Delay-constrained Multicast Group Key Management
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications requi...
Said Gharout, Yacine Challal, Abdelmadjid Bouabdal...
CE
2007
133views more  CE 2007»
13 years 11 months ago
Reusable, lifelike virtual humans for mentoring and role-playing
Lifelike, interactive digital characters, serving as mentors and role-playing actors, have been shown to significantly improve learner motivation and retention. However, the cost...
Edward M. Sims
IJSN
2008
145views more  IJSN 2008»
13 years 11 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
CN
2007
167views more  CN 2007»
13 years 11 months ago
Association management for data dissemination over wireless mesh networks
To enable multimedia broadcasting services in mesh networks, it is critical to optimize the broadcast traffic load. Traditionally, users associate with access points (APs) with th...
Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sr...
CN
2007
92views more  CN 2007»
13 years 11 months ago
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds
Efficient dynamic resource provisioning algorithms are necessary to the development and automation of Quality of Service (QoS) networks. The main goal of these algorithms is to o...
Jocelyne Elias, Fabio Martignon, Antonio Capone, G...