Sciweavers

804 search results - page 102 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
138
Voted
AP2PC
2003
Springer
15 years 9 months ago
Group Formation Among Peer-to-Peer Agents: Learning Group Characteristics
This paper examines the decentralized formation of groups within a peer-to-peer multi-agent system. More specifically, it frames group formation as a clustering problem, and exami...
Elth Ogston, Benno J. Overeinder, Maarten van Stee...
169
Voted
PLDI
2000
ACM
15 years 9 months ago
Functional reactive programming from first principles
Functional Reactive Programming, or FRP, is a general framework for programming hybrid systems in a high-level, declarative manner. The key ideas in FRP are its notions of behavio...
Zhanyong Wan, Paul Hudak
DL
1999
Springer
181views Digital Library» more  DL 1999»
15 years 8 months ago
Quality of OCR for Degraded Text Images
Commercial OCR packages work best with highquality scanned images. They often produce poor results when the image is degraded, either because the original itself was poor quality,...
Roger T. Hartley, Kathleen Crumpton
ICNP
1998
IEEE
15 years 8 months ago
Receiver-based Multicast Scoping: A New Cost-Conscious Join/Leave Paradigm
In Internet multicast, the set of receivers can be dynamic with receivers joining and leaving a group asynchronously and without the knowledge of the sources. The Internet today u...
George F. Riley, Mostafa H. Ammar, Lenitra M. Clay
171
Voted
ASWSD
2006
Springer
15 years 8 months ago
Reusable Services and Semi-automatic Service Composition for Automotive Software
Automotive software has become an important factor in the development of modern and innovative high-end vehicles. More and more functions can only be realized by the cooperation of...
Holger Giese