Sciweavers

7587 search results - page 1387 / 1518
» Network Analysis and Visualisation
Sort
View
HPDC
2008
IEEE
13 years 8 months ago
Eliminating the middleman: peer-to-peer dataflow
Efficiently executing large-scale, data-intensive workflows such as Montage must take into account the volume and pattern of communication. When orchestrating data-centric workflo...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
AAMAS
2007
Springer
13 years 8 months ago
A formal framework for connective stability of highly decentralized cooperative negotiations
Abstract. Multiagent cooperative negotiation is a promising technique for modeling and controlling complex systems. Effective and flexible cooperative negotiations are especially...
Francesco Amigoni, Nicola Gatti
ADT
2010
13 years 8 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
AI
2008
Springer
13 years 8 months ago
Semiring induced valuation algebras: Exact and approximate local computation algorithms
Local computation in join trees or acyclic hypertrees has been shown to be linked to a particular algebraic structure, called valuation algebra. There are many models of this alge...
Jürg Kohlas, Nic Wilson
BMCBI
2008
100views more  BMCBI 2008»
13 years 8 months ago
High-precision high-coverage functional inference from integrated data sources
Background: Information obtained from diverse data sources can be combined in a principled manner using various machine learning methods to increase the reliability and range of k...
Bolan Linghu, Evan S. Snitkin, Dustin T. Holloway,...
« Prev « First page 1387 / 1518 Last » Next »