Sciweavers

796 search results - page 86 / 160
» Spoofing prevention method
Sort
View
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Estimating Packet Arrival Times in Bursty Video Applications
In retransmission-based error-control methods, the most fundamental yet the paramount problem is to determine how long the sender (or the receiver) should wait before deciding tha...
Ali C. Begen, Yucel Altunbasak
ITCC
2005
IEEE
14 years 3 months ago
Dynamic Web Content Filtering based on User's Knowledge
This paper focuses on the development of a maintainable information filtering system. The simple and efficient solution to this problem is to block the Web sites by URL, including...
N. Churcharoenkrung, Yang Sok Kim, Byeong Ho Kang
ISPA
2005
Springer
14 years 3 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
ASIASIM
2004
Springer
14 years 3 months ago
Intuitive Control of Dynamic Simulation Using Improved Implicit Constraint Enforcement
Geometric constraints are imperative components of many dynamic simulation systems to effectively control the behavior of simulated objects. In this paper we present an improved fi...
Min Hong, Samuel W. J. Welch, Min-Hyung Choi
PERCOM
2003
ACM
14 years 3 months ago
Mobile Agent Based Evacuation System When The Battery Runs Out: EASTER
As mobile computing becomes common, the battery issue of mobile computing devices has become increasingly notable. To this end, research and development of various power-conservat...
Heisuke Kaneko, Yoshiaki Fukazawa, Fumihiro Kumeno...