Sciweavers

1683 search results - page 143 / 337
» A Needed Narrowing Strategy
Sort
View
112
Voted
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
15 years 10 months ago
Assembling Sensor Networks
Sometimes sensors need to be assembled in response to an emergency. Such assemblage might take a variety of forms. At one extreme, sensors might converge on a single point. At the...
Jeffrey V. Nickerson
ICCCN
2007
IEEE
15 years 10 months ago
Localization of Wireless Sensor Nodes Using Proximity Information
Abstract— This paper proposes a simple yet efficient localization algorithm for GPS-free sensor nodes in wireless sensor networks (WSN). Our approach is hybrid in the sense that...
Piyush Agrawal, R. K. Ghosh, Sajal K. Das
123
Voted
CONTEXT
2007
Springer
15 years 10 months ago
Context-sensitive Referencing for Ontology Mapping Disambiguation
Abstract. Ontologies can be used for e-business integration, for example by describing existing e-business standards as ontologies. If cooperating parties use different ontologies...
Heiko Paulheim, Michael Rebstock, Janina Fengel
CP
2007
Springer
15 years 10 months ago
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
Defence trees and CP-net (ceteris paribus network) are two useful approaches that can be used to help a system administrator to analyze a security scenario and to give him a model ...
Stefano Bistarelli, Pamela Peretti, Irina Trubitsy...
EMISA
2007
Springer
15 years 10 months ago
A Federated Approach to Enterprise Architecture Model Maintenance
: Enterprise architecture is gaining acceptance as an approach to manage change and foster IT/business alignment by (1) propagating strategy and process changes to the software and...
Ronny Fischer, Stephan Aier, Robert Winter