Sciweavers

8697 search results - page 1499 / 1740
» An Approach to the Enterprise Integration
Sort
View
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 11 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
DEBU
2010
205views more  DEBU 2010»
13 years 11 months ago
Spatio-Temporal Stream Processing in Microsoft StreamInsight
Microsoft StreamInsight is a platform for developing and deploying streaming applications. StreamInsight embraces a temporal stream model to unify and further enrich query languag...
Mohamed H. Ali, Badrish Chandramouli, Balan Sethu ...
DAM
2008
117views more  DAM 2008»
13 years 11 months ago
Analysis on the strip-based projection model for discrete tomography
Discrete tomography deals with image reconstruction of an object with finitely many gray levels (such as two). Different approaches are used to model the raw detector reading. The...
Jiehua Zhu, Xiezhang Li, Yangbo Ye, Ge Wang
DEBU
2008
141views more  DEBU 2008»
13 years 11 months ago
Oracle's SQL Performance Analyzer
We present the SQL Performance Analyzer, a novel approach in Oracle Database 11g to testing database changes, such as upgrades, parameter changes, schema changes, and gathering op...
Khaled Yagoub, Peter Belknap, Benoît Dagevil...
DKE
2008
208views more  DKE 2008»
13 years 11 months ago
Deploying defeasible logic rule bases for the semantic web
Logic is currently the target of the majority of the upcoming efforts towards the realization of the Semantic Web vision, namely making the content of the Web accessible not only t...
Efstratios Kontopoulos, Nick Bassiliades, Grigoris...
« Prev « First page 1499 / 1740 Last » Next »