Sciweavers

80 search results - page 8 / 16
» Trust evaluation through relationship analysis
Sort
View
CN
2002
117views more  CN 2002»
13 years 7 months ago
Achieving differentiated services through multi-class probabilistic priority scheduling
Differentiated Services (DiffServ) is a promising architecture for the next generation Internet due to its scalable and flexible design. In DiffServ, scheduling disciplines play an...
Chen-Khong Tham, Qi Yao, Yuming Jiang
WS
2003
ACM
14 years 29 days ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
CHI
2005
ACM
14 years 8 months ago
Acceptance and usability of a relational agent interface by urban older adults
This study examines the acceptance and usability of an animated conversational agent designed to establish longterm relationships with older, mostly minority adult users living in...
Timothy W. Bickmore, Lisa Caruso, Kerri Clough-Gor...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
AICCSA
2006
IEEE
107views Hardware» more  AICCSA 2006»
14 years 1 months ago
Performance of MIP/WLAN in Rapid Mobility Environments
In this paper, the performance of Mobile IP (MIP) over Wireless LAN is evaluated using a testbed at different vehecular speeds. The result shows that current MIP protocol is not s...
Jun Tian, Abdelsalam Helal