Sciweavers

5511 search results - page 906 / 1103
» Security for Network Places
Sort
View
IAT
2010
IEEE
15 years 2 months ago
Using Negotiation to Reduce Redundant Autonomous Mobile Program Movements
Distributed load managers exhibit thrashing where tasks are repeatedly moved between locations due to incomplete global load information. This paper shows that systems of Autonomou...
Natalia Chechina, Peter King, Phil Trinder
IAJIT
2010
152views more  IAJIT 2010»
15 years 1 months ago
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects
: Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way t...
Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, ...
JITECH
2010
160views more  JITECH 2010»
14 years 11 months ago
Social software for business process modeling
Formal models of business processes are used for a variety of purposes. But where the elicitation of the characteristics of a business process usually takes place in a collaborati...
Agnes Koschmider, Minseok Song, Hajo A. Reijers
JMLR
2010
145views more  JMLR 2010»
14 years 11 months ago
Parallelizable Sampling of Markov Random Fields
Markov Random Fields (MRFs) are an important class of probabilistic models which are used for density estimation, classification, denoising, and for constructing Deep Belief Netwo...
James Martens, Ilya Sutskever
ICASSP
2011
IEEE
14 years 7 months ago
Cooperative spectrum sensing based on matrix rank minimization
In cognitive radio (CR) networks, multi-CR cooperation typically takes place during spectrum sensing, to cope with wireless fading effects and the hidden terminal problem. The use...
Yue Wang, Zhi Tian, Chunyan Feng