Sciweavers

1407 search results - page 230 / 282
» Systems Theory Model for Information Security
Sort
View
MOBIHOC
2008
ACM
14 years 8 months ago
A game approach for multi-channel allocation in multi-hop wireless networks
Channel allocation was extensively investigated in the framework of cellular networks, but it was rarely studied in the wireless ad-hoc networks, especially in the multi-hop ad-ho...
Lin Gao, Xinbing Wang
ISMIS
2003
Springer
14 years 2 months ago
Enacting an Agent-Based Digital Self in a 24x7 Web Services World
As broadband access to the Internet becomes pervasive, the need for a 24 hours a day, seven days a week (24x7) interface within the client devices, requires a level of sophisticati...
Steve Goschnick
IEEEIA
2009
13 years 7 months ago
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning a...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...
DMTCS
2010
146views Mathematics» more  DMTCS 2010»
13 years 6 months ago
Tight Bounds for Delay-Sensitive Aggregation
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenh...
HICSS
2008
IEEE
164views Biometrics» more  HICSS 2008»
14 years 3 months ago
Analysing the Relationship between IT Governance and Business/IT Alignment Maturity
IT governance is one of these concepts that suddenly emerged and became an important issue in the information technology area. Some organisations started with the implementation o...
Steven De Haes, Wim Van Grembergen