Sciweavers

2340 search results - page 465 / 468
» Data abstraction and information hiding
Sort
View
NSDI
2007
13 years 9 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
ATAL
2008
Springer
13 years 9 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
DMIN
2008
158views Data Mining» more  DMIN 2008»
13 years 9 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
EON
2008
13 years 9 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
IJIT
2004
13 years 8 months ago
Computing Entropy for Ortholog Detection
Abstract-- Biological sequences from different species are called orthologs if they evolved from a sequence of a common ancestor species and they have the same biological function....
Hsing-Kuo Pao, John Case