Sciweavers

1902 search results - page 303 / 381
» Information Integration Architecture Development: A Multi-Ag...
Sort
View
154
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 11 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
263
Voted
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 8 months ago
Active knowledge: dynamically enriching RDF knowledge bases by web services
The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to re...
Nicoleta Preda, Gjergji Kasneci, Fabian M. Suchane...
148
Voted
WMRD
1990
15 years 8 months ago
Replication in Ficus Distributed File Systems
Ficus is a replicated general ling environment for Unix intended to scale to very large nationwide networks. The system employs an optimistic one copy availability" model in ...
Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr...
SPATIALCOGNITION
2004
Springer
15 years 9 months ago
Towards Dialogue Based Shared Control of Navigating Robots
Establishing a clean relationship between a robot’s spatial model and natural language components is a non-trivial task, but is key to designing verbally controlled, navigating s...
Robert J. Ross, Hui Shi, Tillman Vierhuff, Bernd K...
WSE
2006
IEEE
15 years 10 months ago
Modeling Request Routing in Web Applications
For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mecha...
Minmin Han, Christine Hofmeister