Sciweavers

666 search results - page 106 / 134
» Describing and simulating internet routes
Sort
View
DIMVA
2004
13 years 9 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
PERCOM
2005
ACM
14 years 7 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
ESWS
2007
Springer
14 years 1 months ago
Towards an Ontology for Process Monitoring and Mining
Abstract. Business Process Analysis (BPA) aims at monitoring, diagnosing, simulating and mining enacted processes in order to support the analysis and enhancement of process models...
Carlos Pedrinaci, John Domingue
EPEW
2005
Springer
14 years 1 months ago
Automatic Translation of WS-CDL Choreographies to Timed Automata
In this paper we show how we can translate Web Services described by WS-CDL into a timed automata orchestration, and more specifically we are interested in Web services with time ...
Gregorio Díaz, Juan José Pardo, Mar&...
HT
2004
ACM
14 years 1 months ago
When open hypermedia meets peer-to-peer computing
We describe the extension to our previous work on a Web-based peer-to-peer open hypermedia system, the DDLS. We enrich the peer model by introducing query history, and propose the...
Jing Zhou, Wendy Hall, David De Roure