Sciweavers

1266 search results - page 227 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
AAAI
1998
13 years 9 months ago
Metacognition in Software Agents Using Classifier Systems
Software agents "living" and acting in a real world software environment, such as an operating system, a network, or a database system, can carry out many tasks for huma...
Zhaohua Zhang, Stan Franklin, Dipankar Dasgupta
EOR
2008
133views more  EOR 2008»
13 years 8 months ago
Vehicle routing with dynamic travel times: A queueing approach
Transportation is an important component of supply chain competitiveness since it plays a major role in the inbound, inter-facility, and outbound logistics. In this context, assig...
Tom Van Woensel, Laoucine Kerbache, Herbert Perema...
ICDE
2011
IEEE
274views Database» more  ICDE 2011»
13 years 4 days ago
SQPR: Stream query planning with reuse
—When users submit new queries to a distributed stream processing system (DSPS), a query planner must allocate physical resources, such as CPU cores, memory and network bandwidth...
Evangelia Kalyvianaki, Wolfram Wiesemann, Quang Hi...
SIGMOD
2008
ACM
191views Database» more  SIGMOD 2008»
14 years 8 months ago
Efficient aggregation for graph summarization
Graphs are widely used to model real world objects and their relationships, and large graph datasets are common in many application domains. To understand the underlying character...
Yuanyuan Tian, Richard A. Hankins, Jignesh M. Pate...
PIMRC
2008
IEEE
14 years 2 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...