Sciweavers

1466 search results - page 284 / 294
» Completeness of the Authentication Tests
Sort
View
MAGS
2008
104views more  MAGS 2008»
13 years 7 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
JODL
2006
131views more  JODL 2006»
13 years 7 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
ENVSOFT
2007
54views more  ENVSOFT 2007»
13 years 7 months ago
Evaluation of landscape and instream modeling to predict watershed nutrient yields
The project goal was to loosely couple the SWAT model and the QUAL2E model and compare their combined ability to predict total phosphorus (TP) and NO3-N plus NO2-N yields to the a...
K. W. Migliaccio, I. Chaubey, B. E. Haggard
MONET
2008
150views more  MONET 2008»
13 years 7 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
SAC
2006
ACM
13 years 7 months ago
Efficient interactive configuration of unbounded modular systems
Interactive configuration guides a user searching through a large combinatorial space of solutions to a system of constraints. We investigate a class of very expressive underlying...
Erik Roland van der Meer, Andrzej Wasowski, Henrik...