Sciweavers

6181 search results - page 1134 / 1237
» Transactional Cluster Computing
Sort
View
IJSN
2006
140views more  IJSN 2006»
13 years 8 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
JCC
2008
105views more  JCC 2008»
13 years 8 months ago
Retrieval of spectral and dynamic properties from two-dimensional infrared pump-probe experiments
Abstract: We have developed a fitting algorithm able to extract spectral and dynamic properties of a three level oscillator from a two-dimensional infrared spectrum (2D-IR) detecte...
Riccardo Chelli, Victor V. Volkov, Roberto Righini
CSCL
2007
114views more  CSCL 2007»
13 years 8 months ago
Community-based learning: The core competency of residential, research-based universities
Traditionally, universities focus primarily on instructionist teaching. Such an understanding has been criticized from theoretical and practical points of view. We believe that so...
Gerhard Fischer, Markus Rohde, Volker Wulf
DKE
2007
132views more  DKE 2007»
13 years 8 months ago
Automated ontology construction for unstructured text documents
Ontology is playing an increasingly important role in knowledge management and the Semantic Web. This study presents a novel episode-based ontology construction mechanism to extra...
Chang-Shing Lee, Yuan-Fang Kao, Yau-Hwang Kuo, Mei...
JCP
2006
106views more  JCP 2006»
13 years 8 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
« Prev « First page 1134 / 1237 Last » Next »