Sciweavers

3089 search results - page 342 / 618
» services 2008
Sort
View
CROSSROADS
2004
108views more  CROSSROADS 2004»
15 years 4 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
CSI
2004
186views more  CSI 2004»
15 years 4 months ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...
COMCOM
2000
130views more  COMCOM 2000»
15 years 4 months ago
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system
ABSTRACT -- SPEC-VALUE, a rigorous scenario-driven approach for the description and validation of complex system functionalities at the early stages of design, is presented. It is ...
Daniel Amyot, Luigi Logrippo
COMCOM
2002
105views more  COMCOM 2002»
15 years 4 months ago
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services m...
Steve Kremer, Olivier Markowitch, Jianying Zhou
COMCOM
1998
132views more  COMCOM 1998»
15 years 4 months ago
A distributed object platform infrastructure for multimedia applications
Although distributed object computing has developed rapidly over the past decade, and is now becoming commercially important, there remain key application areas inadequately suppo...
Geoff Coulson, Michael Clarke