Sciweavers

1266 search results - page 228 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICUMT
2009
13 years 6 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 4 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
ICDCS
2010
IEEE
14 years 10 days ago
A Hybrid Approach to High Availability in Stream Processing Systems
Abstract—Stream processing is widely used by today’s applications such as financial data analysis and disaster response. In distributed stream processing systems, machine fail...
Zhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, ...
LSSC
2005
Springer
14 years 1 months ago
Ant Algorithm for Grid Scheduling Problem
Abstract. Grid computing is a form of distributed computing that involves coordinating and sharing computing, application, data storage or network resources across dynamic and geog...
Stefka Fidanova, Mariya K. Durchova
AAMAS
2002
Springer
13 years 8 months ago
Multiagent Learning for Open Systems: A Study in Opponent Classification
Abstract. Open systems are becoming increasingly important in a variety of distributed, networked computer applications. Their characteristics, such as agent diversity, heterogenei...
Michael Rovatsos, Gerhard Weiß, Marco Wolf