Sciweavers

3305 search results - page 120 / 661
» Can we Rely on SQL
Sort
View
ICC
2007
IEEE
14 years 4 months ago
Detecting Node Misbehavior in Ad hoc Networks
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
IEEEARES
2007
IEEE
14 years 4 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
SEMWEB
2007
Springer
14 years 4 months ago
A Tagging Approach to Ontology Mapping
The reasons for the lack of uptake of the semantic web amongst ordinary users can be attributed to technology perception, comprehensibility and ease of use. To address these three ...
Colm Conroy, Declan O'Sullivan, David Lewis
CCECE
2006
IEEE
14 years 4 months ago
Evaluation Patterns of Tele-Haptics
Multimedia and Information technology are reaching limits in terms of what can be done in multimedia applications with only sight and sound. The next critical step is to bring the...
Xiaojun Shen, Jilin Zhou, Nicolas D. Georganas
EUROMICRO
2005
IEEE
14 years 3 months ago
Distribution of a Hierarchical Component in a Non-Connected Environment
This article addresses the utilisation of the componentbased approach for building and executing a distributed application that can offer services over a set of heterogeneous and ...
Didier Hoareau, Yves Mahéo