Sciweavers

1266 search results - page 157 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
COMCOM
2006
118views more  COMCOM 2006»
15 years 4 months ago
A novel content-aware interleaving for wireless video transmission
In wireless network environments, the effect of transmission errors and losses on the video quality vary, depending on the intensity of the burst, and which parts of the video str...
Jeong-Yong Choi, Jitae Shin
PERCOM
2006
ACM
15 years 4 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones
SEM
2004
Springer
15 years 9 months ago
PlanetSim: A New Overlay Network Simulation Framework
Abstract. Current research in peer to peer systems is lacking appropriate environments for simulation and experimentation of large scale overlay services. This has led to a plethor...
Pedro García López, Carles Pairot, R...
ISCAPDCS
2004
15 years 5 months ago
Pushmepullyou: The Reality of Interaction with Shared Objects in Networked Walk-in Displays
This paper investigates the reality of shared manipulation of objects between users in distributed walkin displays and presents solutions to address the effects of constraints of ...
David J. Roberts, Oliver Otto, Robin Wolff
TWC
2008
156views more  TWC 2008»
15 years 4 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou