Sciweavers

AINA
2008
IEEE
14 years 6 months ago
A Question Answering System for the Operation of Software Applications
Reflecting the rapid growth of information technology, the configuration of software applications, such as word processors and spreadsheets, is both sophisticated and complicate...
Atsushi Fujii, Seiji Takegata
AINA
2008
IEEE
14 years 6 months ago
An Architecture for Mobility Support in a Next-Generation Internet
—The current internetworking architecture presents some limitations to naturally support mobility, security and multihoming. Among the limitations, the IP semantic overload seems...
Walter Wong, Rodolfo Villaca, Luciano Paula, Rafae...
AINA
2008
IEEE
14 years 6 months ago
Live Network Performance Challenge: FLASH-OFDM vs. HSDPA
HSDPA networks are intensively being deployed to provide mobile broadband connectivity to mobile devices. In addition to HSDPA, FLASH-OFDM is another wireless broadband option ope...
Andres Arjona, Antti Ylä-Jääski, Ju...
AINA
2008
IEEE
14 years 6 months ago
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Differentiated quality of service is a way for a website operator to provide different service levels to its clients. Traditional HTTP request scheduling schemes can achieve this,...
Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, R...
AINA
2008
IEEE
14 years 6 months ago
Extending Always Best Connected Paradigm for Voice Communications in Next Generation Wireless Network
Selecting transparently a proper network connection for voice communication will be a fundamental requirement in future multi-mode heterogeneous wireless network. This paper exten...
Tein-Yaw Chung, Fong-Ching Yuan, Yung-Mu Chen, Baw...
AINA
2008
IEEE
14 years 6 months ago
FAN: A Scalable Flabellate P2P Overlay Supporting Multi-Dimensional Attributes
Wei Song, Ruixuan Li, Zhengding Lu, Guangcan Yu
AINA
2008
IEEE
14 years 6 months ago
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System
—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for ...
Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung
AINA
2008
IEEE
14 years 6 months ago
A Peer-to-Peer Approach for Mobile File Transfer in Opportunistic People Networks
With wireless technologies extending to every part of our daily lives, mobile networking applications are becoming increasingly popular for accessing the Internet. In this paper, ...
Ling-Jyh Chen, Ting-Kai Huang
AINA
2008
IEEE
14 years 6 months ago
Multi-Token Distributed Mutual Exclusion Algorithm
This paper is a contribution to the inception of multiple tokens in solving distributed mutual exclusion problem. The proposed algorithm is based on the token ring approach and al...
Md. Abdur Razzaque, Choong Seon Hong
AINA
2008
IEEE
14 years 6 months ago
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"
A user authentication system using "unclear images" as pass-images has been proposed, in which only legitimate users can understand their meaning by viewing the original...
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Ma...