Sciweavers

2071 search results - page 197 / 415
» Behaviour Management in Database Applications
Sort
View
APLAS
2009
ACM
14 years 5 months ago
Asymptotic Resource Usage Bounds
When describing the resource usage of a program, it is usual to talk in asymptotic terms, such as the well-known “big O” notation, whereby we focus on the behaviour of the prog...
Elvira Albert, Diego Alonso, Puri Arenas, Samir Ge...
AICT
2007
IEEE
180views Communications» more  AICT 2007»
14 years 4 months ago
BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic
Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid developm...
Karim Mohammed Rezaul, Vic Grout
DALT
2004
Springer
14 years 3 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
ICDCSW
2003
IEEE
14 years 3 months ago
Garnet: A Middleware Architecture for Distributing Data Streams Originating in Wireless Sensor Networks
We present an architectural framework, Garnet, which a data stream centric abstraction to encourage the manipulation and exploitation of data generated in sensor networks. By prov...
Lyndell St. Ville, Peter Dickman
IEEEICCI
2003
IEEE
14 years 3 months ago
Conceptual Framework for Interactive Ontology Building
Abstract— An ontology is a formal language adequately representing the knowledge used for reasoning in a specific environment. When contradictions arise and make ontologies inad...
Jean Sallantin, Jacques Divol, Patrice Duroux