Sciweavers

972 search results - page 161 / 195
» Using Preference Order in Ontologies
Sort
View
WONS
2005
IEEE
14 years 2 months ago
MASSIVE: An Emulation Environment for Mobile Ad-Hoc Networks
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...
ATAL
2005
Springer
14 years 2 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu
FC
2005
Springer
104views Cryptology» more  FC 2005»
14 years 2 months ago
Event Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or...
Eu-Jin Goh, Philippe Golle
PDC
2004
ACM
14 years 2 months ago
The weight of space: participatory design research for configuring habitable space for new arrival women in Hong Kong
When arriving to Hong Kong from China, the first difficulty of the new arrival women of the grassroots class is usually environmental stress. Their socio-economic situations often...
Jackie Yan-Chi Kwok
GECCO
2004
Springer
14 years 2 months ago
On Multi-class Classification by Way of Niching
In recent literature, the niche enabling effects of crowding and the sharing algorithms have been systematically investigated in the context of Genetic Algorithms and are now estab...
Andrew R. McIntyre, Malcolm I. Heywood