Sciweavers

5234 search results - page 155 / 1047
» Simulation of Computer Network Attacks
Sort
View
CIG
2005
IEEE
14 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
ICIP
2008
IEEE
14 years 11 months ago
Low delay streaming of computer graphics
In this paper, we present a graphics streaming system for remote gaming in a local area network. The framework aims at creating a networked game platform for home and hotel enviro...
Peter Eisert, Philipp Fechteler
PERCOM
2003
ACM
14 years 9 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
AB
2008
Springer
14 years 4 months ago
An Algorithm for Qualitative Simulation of Gene Regulatory Networks with Steep Sigmoidal Response Functions
A specific class of ODEs has been shown to be adequate to describe the essential features of the complex dynamics of Gene-Regulatory Networks (GRN). But, the effective exploitatio...
Liliana Ironi, Luigi Panzeri, Erik Plahte
INFOCOM
2009
IEEE
14 years 4 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...