Sciweavers

2826 search results - page 498 / 566
» A resource-based analysis of IT sourcing
Sort
View
IWLCS
2001
Springer
14 years 2 months ago
Explorations in LCS Models of Stock Trading
In previous papers we have described the basic elements for building an economic model consisting of a group of artificial traders functioning and adapting in an environment conta...
Sonia Schulenburg, Peter Ross
LCN
2000
IEEE
14 years 2 months ago
On Integrating Differentiated Services and UMTS Networks
Differentiated Services (DS) is currently the major approach discussed to provide network layer service differentiation in IP networks. However, the discussion mainly addresses ...
Jörg Diederich, Thorsten Lohmar, Martina Zitt...
MOBICOM
2000
ACM
14 years 2 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
HICSS
1999
IEEE
193views Biometrics» more  HICSS 1999»
14 years 2 months ago
Web-based Access to Distributed High-Performance Geographic Information Systems for Decision Support
A number of applications that use GIS for decision support can potentially be enhanced by the use of high-performance computers, broadband networks and mass data stores. We descri...
Paul D. Coddington, Kenneth A. Hawick, Heath A. Ja...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw