Sciweavers

251 search results - page 25 / 51
» Transactions with isolation and cooperation
Sort
View
EKAW
2000
Springer
14 years 1 months ago
OIL in a Nutshell
Currently computers are changing from single isolated devices into entry points into a worldwide network of information exchange and business transactions. Support in data, inform...
Dieter Fensel, Ian Horrocks, Frank van Harmelen, S...
ISPE
2003
13 years 11 months ago
PLIB ontology for B2B electronic commerce
: Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide We...
Youcef Aklouf, Guy Pierra, Yamine Aït Ameur, ...
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 11 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
AAAI
1996
13 years 11 months ago
Improving Case Retrieval by Remembering Questions
This paper discusses techniques that improve the performance of a case retrieval system, after it is deployed, as a result of the continued usage of the system, by remembering pre...
Richard Alterman, Daniel Griffin
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 4 months ago
Design, Implementation and Characterization of a Cooperative Communications System
Cooperative communications is a class of techniques which seek to improve reliability and throughput in wireless systems by pooling the resources of distributed nodes. While coope...
Patrick Murphy, Ashutosh Sabharwal