Sciweavers

1266 search results - page 206 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICDCSW
2006
IEEE
14 years 2 months ago
Implementation and Performance Study of a New NAT/Firewall Signaling Protocol
The NAT/Firewall NSIS Signaling Layer Protocol (NAT/Firewall NSLP) is a path-coupled signaling protocol for explicit Network Address Translator and firewall configuration within...
Niklas Steinleitner, Henning Peters, Xiaoming Fu
ICDCSW
2005
IEEE
14 years 2 months ago
A User-Driven Adaptation Strategy for Mobile Video Streaming Applications
Recent advances in mobile and wireless technologies make possible the bear of new services and the extension of traditional ones in new scenarios. Adaptation strategies play a cru...
Domenico Cotroneo, Generoso Paolillo, C. Pirro, St...
GIS
2009
ACM
14 years 1 months ago
Machine learning approach to report prioritization with an application to travel time dissemination
This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
Piotr Szczurek, Bo Xu, Jie Lin, Ouri Wolfson
AINA
2007
IEEE
14 years 15 days ago
On the Design of an Efficient Architecture for Supporting Large Crowds of Autonomous Agents
Crowd simulations require both rendering visually plausible images and managing the behavior of autonomous agents. Therefore, these applications need an efficient design that allo...
Miguel Lozano, Pedro Morillo, Juan M. Orduñ...
TON
2008
102views more  TON 2008»
13 years 8 months ago
Designing less-structured P2P systems for the expected high churn
Abstract--We address the problem of highly transient populations in unstructured and loosely-structured peer-to-peer systems. We propose a number of illustrative query-related stra...
Fabián E. Bustamante, Yi Qiao