Sciweavers

161 search results - page 26 / 33
» Combining Algorithms for Deciding Knowledge in Security Prot...
Sort
View
WCE
2007
13 years 8 months ago
A Proactive Horizontal Handover Algorithm for WiFi-WiMax Interoperable Networks
— Two important high bandwidth wireless certifications in our days are Worldwide Interoperability for Microwave Access (WiMax) and Wireless Fidelity (WiFi). They can interoperate...
Álvaro Suárez Sarmiento, Kholoud Elb...
ICWS
2009
IEEE
14 years 4 months ago
Integrating Behavioral Trust in Web Service Compositions
Algorithms for composing Web services (WS) traditionally utilize the functional and quality-of-service parameters of candidate services to decide which services to include in the ...
Sharon Paradesi, Prashant Doshi, Sonu Swaika
KI
2008
Springer
13 years 7 months ago
Shallow Models for Non-iterative Modal Logics
Abstract. Modal logics see a wide variety of applications in artificial intelligence, e.g. in reasoning about knowledge, belief, uncertainty, agency, defaults, and relevance. From ...
Lutz Schröder, Dirk Pattinson
DCOSS
2006
Springer
13 years 11 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
MIDDLEWARE
2007
Springer
14 years 1 months ago
Rule-based reasoning about qualitative spatiotemporal relations
This paper is about a novel rule-based approach for reasoning about qualitative spatiotemporal relations among technology-rich autonomous objects, to which we refer to as artifact...
Clemens Holzmann