Sciweavers

452 search results - page 44 / 91
» Is home network application acceptable or not
Sort
View
COMPSAC
2003
IEEE
14 years 2 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...
SAC
2002
ACM
13 years 8 months ago
Concurrency control for distributed cooperative engineering applications
Distributed cooperative engineering applications require consistent and long-term sharing of large volumes of data, which may cause conflicts due to concurrent read/write operatio...
João Coelho Garcia, Paulo Ferreira
IWANN
2009
Springer
14 years 3 months ago
Fuzzy Logic, Soft Computing, and Applications
We survey on the theoretical and practical developments of the theory of fuzzy logic and soft computing. Specifically, we briefly review the history and main milestones of fuzzy ...
Inma P. Cabrera, Pablo Cordero, Manuel Ojeda-Acieg...
AUTONOMICS
2008
ACM
13 years 10 months ago
MWM: a map-based world model for wireless sensor networks
A prominent functionality of a Wireless Sensor Network (WSN) is environmental monitoring. For this purpose the WSN creates a model for the real world by using abstractions to pars...
Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Aya...
IJIM
2008
124views more  IJIM 2008»
13 years 8 months ago
Personalization and User Profile Management
Personalization and effective user profile management will be critical to meet the individual users' needs and for achieving eInclusion and eAccessibility. This paper outlines...
Françoise Petersen, Giovanni Bartolomeo, Mi...