Sciweavers

4998 search results - page 911 / 1000
» The case for intentional networking
Sort
View
EJWCN
2010
122views more  EJWCN 2010»
13 years 3 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
IWOCA
2010
Springer
232views Algorithms» more  IWOCA 2010»
13 years 3 months ago
Computing Role Assignments of Proper Interval Graphs in Polynomial Time
A homomorphism from a graph G to a graph R is locally surjective if its restriction to the neighborhood of each vertex of G is surjective. Such a homomorphism is also called an R-r...
Pinar Heggernes, Pim van 't Hof, Daniël Paulu...
JCIT
2010
181views more  JCIT 2010»
13 years 3 months ago
Geospatial Web Services Semantic Discovery Approach Using Quality
The use of geographic data through Web services shows the geospatial Web Services (GWS). A growing number of GWS designed to interoperate spatial information over the network have...
Rezeg Khaled, Laskri Mohamed Tayeb, Sylvie Servign...
NOTERE
2010
13 years 3 months ago
Experimental assessment of the TARGET adaptive ontology-based Web search framework
Finding relevant information on the Web can be a complex task for most of the users. Although Web search applications are improving, they still need to be more intelligent to adapt...
Nicolas Guelfi, Cédric Pruski, Chantal Reyn...
SIGACT
2010
68views more  SIGACT 2010»
13 years 3 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser