Sciweavers

397 search results - page 48 / 80
» Complexity: Concept, Causes and Control
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar
IJWGS
2006
125views more  IJWGS 2006»
13 years 7 months ago
Compiling business processes: untangling unstructured loops in irreducible flow graphs
: This paper presents a systematic study of some major problems involved in the transformation of business process modelling languages to executable business process representation...
Wei Zhao, Rainer Hauser, Kamal Bhattacharya, Barre...
WISTP
2010
Springer
13 years 5 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
HCI
2009
13 years 5 months ago
Intelligent Agents for Training On-Board Fire Fighting
Simulation-based training in complex decision making often requires ample personnel for playing various roles (e.g. team mates, adversaries). Using intelligent agents may diminish ...
Karel van den Bosch, Maaike Harbers, Annerieke Heu...
SAFECOMP
2010
Springer
13 years 5 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska