Sciweavers

3750 search results - page 603 / 750
» Timed Automata Patterns
Sort
View
99
Voted
ICANN
2009
Springer
15 years 9 months ago
Algorithms for Structural and Dynamical Polychronous Groups Detection
Polychronization has been proposed as a possible way to investigate the notion of cell assemblies and to understand their role as memory supports for information coding. In a spiki...
Régis Martinez, Hélène Paugam...
ICN
2009
Springer
15 years 9 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
ICWE
2009
Springer
15 years 9 months ago
Trust and Reputation Mining in Professional Virtual Communities
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar
124
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 9 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
SG
2009
Springer
15 years 9 months ago
A Rendering Method for 3D Origami Models Using Face Overlapping Relations
When we construct a model of origami (a model of a folded sheet of paper) in a computer, it is usual to represent the model as a set of polygons having zero thickness. One of the t...
Yohsuke Furuta, Jun Mitani, Yukio Fukui