Sciweavers

1721 search results - page 289 / 345
» The fundamentals of hybrid systems modelers
Sort
View
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 4 months ago
Service Oriented Architecture: Challenges for Business and Academia
Today, the means for attaining competitive advantage with information technology (IT) has shifted from efficiently managing the organization's operations to discovering ways ...
Amelia Maurizio, James Sager, Peter Jones, Gail Co...
INFOCOM
2008
IEEE
14 years 4 months ago
Window Flow Control: Macroscopic Properties from Microscopic Factors
—This paper studies window flow control focusing on bridging the gap between microscopic factors such as burstiness in sub-RTT timescales, and observable macroscopic properties ...
Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, ...
CIS
2005
Springer
14 years 3 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
DRM
2005
Springer
14 years 3 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
14 years 3 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert