Sciweavers

4987 search results - page 944 / 998
» Support Ordered Resolution
Sort
View
ACSC
2004
IEEE
15 years 7 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
CF
2004
ACM
15 years 7 months ago
Reducing traffic generated by conflict misses in caches
Off-chip memory accesses are a major source of power consumption in embedded processors. In order to reduce the amount of traffic between the processor and the off-chip memory as ...
Pepijn J. de Langen, Ben H. H. Juurlink
ATAL
2006
Springer
15 years 7 months ago
Convergence analysis for collective vocabulary development
We study how decentralized agents can develop a shared vocabulary without global coordination. Answering this question can help us understand the emergence of many communication s...
Jun Wang, Les Gasser, Jim Houk
CSB
2004
IEEE
152views Bioinformatics» more  CSB 2004»
15 years 7 months ago
EcMLST: An Online Database for Multi Locus Sequence Typing of Pathogenic Escherichia coli
In order to provide a portable and accurate typing system for the unambiguous characterization of pathogenic Escherichia coli isolates to the scientific community, we have constru...
Weihong Qi, David W. Lacher, Alyssa C. Bumbaugh, K...
CAISE
2006
Springer
15 years 7 months ago
Model-Driven Enterprise Systems Configuration
Enterprise Systems potentially lead to significant efficiency gains but require a well-conducted configuration process. A promising idea to manage and simplify the configuration pr...
Jan Recker, Jan Mendling, Wil M. P. van der Aalst,...