Sciweavers

4330 search results - page 779 / 866
» Analyzing security architectures
Sort
View
125
Voted
IAJIT
2007
128views more  IAJIT 2007»
15 years 3 months ago
A Multi-Agent System for POS-Tagging Vocalized Arabic Texts
: In this paper, we address the problem of Part-Of-Speech(POS) tagging of Arabic texts with vowel marks. After the description of the specificities of Arabic language and the induc...
Chiraz Ben Othmane Zribi, Aroua Torjmen, Mohamed B...
123
Voted
IJCIM
2007
122views more  IJCIM 2007»
15 years 3 months ago
Implementation approach of ERP with mass customization
: This paper analyzes the shortage of traditional ERP systems in the current dynamic and competitive enterprises environment. The new generation ERP system needs to be frequently c...
Y. Zhao, Y. S. Fan
166
Voted
SIGMETRICS
2008
ACM
131views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
On the design of hybrid peer-to-peer systems
In this paper, we consider hybrid peer-to-peer systems where users form an unstructured peer-to-peer network with the purpose of assisting a server in the distribution of data. We...
Stratis Ioannidis, Peter Marbach
IJNSEC
2007
143views more  IJNSEC 2007»
15 years 3 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
125
Voted
IJRR
2007
113views more  IJRR 2007»
15 years 3 months ago
Broadcast Feedback of Stochastic Cellular Actuators Inspired by Biological Muscle Control
— This paper presents a broadcast feedback approach to the distributed stochastic control of an actuator system consisting of many cellular units. This control architecture was i...
Jun Ueda, Lael Odhner, H. Harry Asada