Sciweavers

15251 search results - page 2826 / 3051
» Network Science - Theory and Application
Sort
View
PADL
2001
Springer
15 years 8 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
UM
2001
Springer
15 years 8 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
IPPS
2000
IEEE
15 years 8 months ago
A Parallel Co-evolutionary Metaheuristic
In order to show that the parallel co-evolution of di erent heuristic methods may lead to an e cient search strategy, we have hybridized three heuristic agents of complementary beh...
Vincent Bachelet, El-Ghazali Talbi
117
Voted
IPPS
2000
IEEE
15 years 8 months ago
Switch Scheduling in the Multimedia Router (MMR)
The primary goal of the Multimedia Router (MMR) project is the design and implementation of a router optimized for multimedia applications. The router is targeted for use in clust...
Damon S. Love, Sudhakar Yalamanchili, José ...
ISCC
2000
IEEE
15 years 8 months ago
Managing Services in Distributed Systems by Integrating Trading and Load Balancing
With a changing structure of networks and application systems due to the requirements of decentralised enterprises and open service markets, distributed systems with rapidly incre...
Dirk Thißen, Helmut Neukirchen
« Prev « First page 2826 / 3051 Last » Next »