Sciweavers

1580 search results - page 43 / 316
» Non-Interference Through Determinism
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 3 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
CLUSTER
2007
IEEE
14 years 3 months ago
Optimal synchronization frequency for dynamic pipelined computations on heterogeneous systems
— In this paper we give a theoretical model for determining the synchronization frequency that minimizes the parallel execution time of loops with uniform dependencies dynamicall...
Florina M. Ciorba, Ioannis Riakiotakis, Theodore A...
APWEB
2005
Springer
13 years 10 months ago
A Neural Network Approach to Web Graph Processing
In this paper, we will provide an overview of some of the more recent developments in web graph processing using the classic Google page rank equation as popularized by Brins and P...
Ah Chung Tsoi, Franco Scarselli, Marco Gori, Marku...
SEMWEB
2010
Springer
13 years 6 months ago
Deciding Agent Orientation on Ontology Mappings
Effective communication in open environments relies on the ability of agents to reach a mutual understanding of the exchanged message by reconciling the vocabulary (ontology) used....
Paul Doran, Terry R. Payne, Valentina A. M. Tamma,...
HCI
2009
13 years 6 months ago
A Study on the Design of Voice Navigation of Car Navigation System
This study tries to find the designing blind spots of the voice prompt function in the current car navigation systems and make improvement suggestions. The experimental plan was im...
Chih-Fu Wu, Wan-Fu Huang, Tung-Chen Wu