Sciweavers

1266 search results - page 230 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
112
Voted
COMCOM
2007
82views more  COMCOM 2007»
15 years 3 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana
151
Voted
AFRIGRAPH
2001
ACM
15 years 7 months ago
Expressive textures
If a moving image is more expressive than words or than a still image, then an animated facial expression can explain more in depth the feelings of a virtual character. Facial ani...
K. Fei
120
Voted
ATAL
2008
Springer
15 years 5 months ago
Cooperative search for optimizing pipeline operations
We present an application of a multi-agent cooperative search approach to the problem of optimizing gas pipeline operations, i.e. finding control parameters for a gas transmission...
T. Mora, Abu B. Sesay, Jörg Denzinger, Hossei...
189
Voted
CORR
2012
Springer
237views Education» more  CORR 2012»
13 years 11 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
161
Voted
ICWS
2009
IEEE
16 years 26 days ago
Scalable and Reliable Location Services through Decentralized Replication
—One of the critical challenges for service oriented computing systems is the capability to guarantee scalable and reliable service provision. This paper presents Reliable GeoGri...
Gong Zhang, Ling Liu, Sangeetha Seshadri, Bhuvan B...