All books entitled “Learn … with 1000 exercises” have in common the same basic principle. They aim to supply enough material to students so that they may better understand t...
Enrique Lazcorreta, Federico Botella, Antonio Fern...
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
Flood control for reservoirs require operations in a dynamic and cooperative manner in order to respond to the changing flood control conditions. There is an increasing emphasis on...
Chuntian Cheng, Kwok-wing Chau, Gang Li, Xiang-Yan...
In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. Like other distributed trust management sy...
This paper describes the architecture and operation of a Multi Agent system for providing end users with an intelligent interface for video conference and cooperative work services...