Sciweavers

2386 search results - page 405 / 478
» Database Security 2000
Sort
View
SBRN
2000
IEEE
14 years 2 months ago
Non-Linear Modelling and Chaotic Neural Networks
This paper proposes a simple methodology to construct an iterative neural network which mimics a given chaotic time series. The methodology uses the Gamma test to identify a suita...
Antonia J. Jones, Steve Margetts, Peter Durrant, A...
VL
2000
IEEE
120views Visual Languages» more  VL 2000»
14 years 2 months ago
Visualizing the Synchronization of Java-Threads with UML
Concurrent programming is a complex task, even with modern languages such as Java who provide languagebased support for multithreading and synchronization. In addition to typical ...
Katharina Mehner, Annika Wagner
SAC
2000
ACM
14 years 2 months ago
XML Dataspaces for Mobile Agent Coordination
This paper presents XMARS, a programmable coordination architecture for Internet applications based on mobile agents. In XMARS, agents coordinate – both with each other and with...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
SIGCOMM
2000
ACM
14 years 2 months ago
FIRE: Flexible intra-AS routing environment
Current routing protocols are monolithic, specifying the algorithm used to construct forwarding tables, the metric used by the algorithm (generally some form of hop-count), and th...
Craig Partridge, Alex C. Snoeren, W. Timothy Stray...
SIGECOM
2000
ACM
147views ECommerce» more  SIGECOM 2000»
14 years 2 months ago
MultECommerce: a distributed architecture for collaborative shopping on the WWW
The WWW has made information and services more available than ever before. Many of the first Web applications have been emulations of real world activities, in particular, e-comme...
Stefano Puglia, Robert Carter, Ravi Jain