Sciweavers

632 search results - page 78 / 127
» Two Facets of Authentication
Sort
View
ITCC
2002
IEEE
14 years 1 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
DIALM
1999
ACM
150views Algorithms» more  DIALM 1999»
14 years 1 months ago
Mobile computing in next generation wireless networks
In this paper, we attempt to describe the evolving status of wireless communications and its impact on the future of mobile computing. We present a historical perspective and eluc...
Prathima Agrawal, David Famolari
SMA
1999
ACM
107views Solid Modeling» more  SMA 1999»
14 years 1 months ago
Generation of swept volumes of toroidal endmills in five-axis motion using space curves
Accurate prediction of the swept volume of a cutting tool is essential in NC verification algorithms for detecting deficiencies in a proposed tool path, such as gouging, undercutt...
David Roth, Sanjeev Bedi, Fathy Ismail
ER
2000
Springer
114views Database» more  ER 2000»
14 years 13 days ago
From Web Sites to Web Applications: New Issues for Conceptual Modeling
Abstract E-commerce, web-based booking systems, and on-line auction systems are only a few examples that demonstrate how WWW sites are evolving from hypermedia information reposito...
Luciano Baresi, Franca Garzotto, Paolo Paolini
ISSA
2008
13 years 10 months ago
Spam Over Internet Telephony and How to Deal with it
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communi...
Rachid El Khayari, Nicolai Kuntze, Andreas U. Schm...