Sciweavers

14348 search results - page 2750 / 2870
» Active Database Systems
Sort
View
ICC
2007
IEEE
154views Communications» more  ICC 2007»
15 years 9 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
126
Voted
ICNP
2007
IEEE
15 years 9 months ago
Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANs
— Rate adaptation is one of the basic functionalities in today’s 802.11 wireless LANs (WLANs). Although it is primarily designed to cope with the variability of wireless channe...
Jaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon...
124
Voted
IWPSE
2007
IEEE
15 years 9 months ago
Talking tests: an empirical assessment of the role of fit acceptance tests in clarifying requirements
The starting point for software evolution is usually a change request, expressing the new or updated requirements on the delivered system. The requirements specified in a change ...
Filippo Ricca, Marco Torchiano, Mariano Ceccato, P...
128
Voted
ATAL
2007
Springer
15 years 8 months ago
Goals in the context of BDI plan failure and planning
We develop a Belief-Desire-Intention (BDI) style agent-oriented programming language with special emphasis on the semantics of goals in the presence of the typical BDI failure han...
Sebastian Sardiña, Lin Padgham
127
Voted
CCS
2007
ACM
15 years 8 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
« Prev « First page 2750 / 2870 Last » Next »