Πλοήγηση ανά Θέμα "Technical presentations"
Αποτελέσματα 1-8 από 8
-
An architecture for secure VoiIP and collaboration applications
(2007)VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides ... -
Blending e-learning technologies and practices in University Pedagogy: Between theory and praxis
(2005)The principle and dominant model of integrating e-learning in traditional teaching in the Anglophone academic world is 'blended learning'. Blended learning also is used to describe learning that mixes various event-based ... -
Broadcast erasure channel with feedback-capacity and algorithms
(2009)We consider the two-user broadcast erasure channel where feedback in the form of ack messages is fed back to the transmitter. We provide an upper bound to the capacity region of this system. We then present two algorithms ... -
Distribute, store and retrieve management policies in wireless ad-hoc networks using the content delivery publish/subscribe paradigm
(2009)Policy management is a management paradigm that has been extensively studied for the case of fixed networks but limited work can be found for migrating it to mobile environments. It enables dynamic adaptation of the network ... -
Enabling persistent identification of groups of duplicates in data aggregators
(2016)Data aggregators harvest, deduplicate and make available content from disparate data sources in different domains, such as cultural information, academic, and scientific content. The availability of aggregated data in the ... -
Introducing Non-Computer Science Undergraduates to Web Development: Results of an Investigative Study on Student Teachers
(2003)A series of workshops aming at introducing non-computer science undergraduates to web development were discussed. Forty-six second year student teachers participated in a series of eight two-hour workshops, organized within ... -
A max-min approach for hiding frequent itemsets
(2006)In this paper we are proposing a new algorithmic approach for sanitizing raw data from sensitive knowledge in the context of mining of association rules. The new approach (a) relies on the maxmin criterion which is a method ... -
New prioritization schemes for QoS provisioning in 802.11 wireless networks
(2008)Due to the unreliable nature of the wireless medium, provisioning of Quality of Service (QoS) in wireless LANs is far more complicated than in wired networks. In order to address this challenge, IEEE 802.11e defines a ...