Sciweavers

1512 search results - page 282 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
CN
2010
120views more  CN 2010»
13 years 9 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
ICETE
2004
210views Business» more  ICETE 2004»
13 years 10 months ago
Knowledge and Content-Based Audio Retrieval Using Wordnet
: Sound producers create the sound that goes along the image in cinema and video productions, as well as spots and documentaries. Some sounds are recorded for the occasion. Many oc...
Pedro Cano, Markus Koppenberger, Sylvain Le Groux,...
JUCS
2008
113views more  JUCS 2008»
13 years 8 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
NSDI
2010
13 years 10 months ago
Reverse traceroute
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Rese...
Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Ku...
CL
2012
Springer
11 years 11 months ago
Object swapping challenges: An evaluation of imageSegment
In object-oriented systems, runtime memory is composed of an object graph in which objects refer to other objects. This graph of objects evolves while the system is running. Graph...
Mariano Martinez Peck, Noury Bouraqadi, Sté...