Sciweavers

359 search results - page 32 / 72
» Information Modeling: The Process and the Required Competenc...
Sort
View
TDSC
2011
13 years 2 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
ACMIDC
2011
12 years 11 months ago
Examining values: an analysis of nine years of IDC research
Explicitly examining the values held by a research community provides a tool in which participants can define its culture, conduct informed research, and reflect on their design p...
Svetlana Yarosh, Iulian Radu, Seth Hunter, Eric Ro...
SOCA
2010
IEEE
13 years 5 months ago
Towards a diamond SOA operational model
The triangular operational model with the three roles of service-registry, -provider, and -consumer has been the traditional operational model in Service-oriented Architectures (SO...
Mohammed AbuJarour, Felix Naumann
CAV
2009
Springer
116views Hardware» more  CAV 2009»
14 years 10 days ago
Priority Scheduling of Distributed Systems Based on Model Checking
Priorities are used to control the execution of systems to meet given requirements for optimal use of resources, e.g., by using scheduling policies. For distributed systems, it is ...
Ananda Basu, Saddek Bensalem, Doron Peled, Joseph ...
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
13 years 5 months ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff