Sciweavers

1829 search results - page 88 / 366
» aims 2008
Sort
View
172
Voted
IJNM
2008
131views more  IJNM 2008»
15 years 4 months ago
Using temporal correlation for fault localization in dynamically changing networks
A mobile ad-hoc network creates a dynamic environment where node mobility can cause periodic changes in routes. Most existing fault localization algorithms assume availability of ...
Maitreya Natu, Adarshpal S. Sethi
124
Voted
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 4 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 4 months ago
SurePath: An Approach to Resilient Anonymous Routing
Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile ...
Yingwu Zhu, Yiming Hu
IJVR
2008
158views more  IJVR 2008»
15 years 4 months ago
How and Why Affordable Virtual Reality Shapes the Future of Education
This paper presents an analysis of how and why a new generation of virtual reality peripherals affect virtual reality in general, and its uses for education in particular. We descr...
Barnabas Takacs
IJVR
2008
122views more  IJVR 2008»
15 years 4 months ago
An Emotion-based Adaptive Behavioural Model for Simulated Virtual Agents
Simulations utilizing virtual humans, or computer controlled agents, are more predominant now than ever. Many of these simulations suffer from a lack of effective, stimulating, and...
Ling Li, Sean MacDonnell