Sciweavers

42388 search results - page 8416 / 8478
» Classification Using Information
Sort
View
CORR
2007
Springer
121views Education» more  CORR 2007»
13 years 10 months ago
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
—Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, in which collected data are fused before they are sent to ...
Hung-Ta Pai, Yunghsiang S. Han
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
13 years 10 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
JCS
2008
119views more  JCS 2008»
13 years 10 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 10 months ago
An exploratory study of Google Scholar
Purpose – This paper2 discusses the new scientific search service Google Scholar (GS). This search engine, intended for searching exclusively scholarly documents, will be descri...
Philipp Mayr, Anne-Kathrin Walter
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 10 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
« Prev « First page 8416 / 8478 Last » Next »