Sciweavers

16 search results - page 3 / 4
» The topology of covert conflict
Sort
View
INFORMATICALT
2008
84views more  INFORMATICALT 2008»
13 years 5 months ago
Multi-Criterion Assessment of Preferences for Communication Alternatives of Wind Power Park Information System
Abstract. This paper presents the application of multi-criterion approach to the analysis and comparison of reference alternatives of wind power park information system (WPPIS) whi...
Antanas Nemura, Arturas Klementavicius
SSD
2009
Springer
145views Database» more  SSD 2009»
13 years 11 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
BMCBI
2010
137views more  BMCBI 2010»
13 years 5 months ago
TreeGraph 2: Combining and visualizing evidence from different phylogenetic analyses
Background: Today it is common to apply multiple potentially conflicting data sources to a given phylogenetic problem. At the same time, several different inference techniques are...
Ben C. Stöver, Kai F. Müller
ESOA
2006
13 years 9 months ago
ASOS: An Adaptive Self-organizing Protocol for Surveillance and Routing in Sensor Networks
We present a simple model of self-organization for sensor networks that addresses two conflicting requirements: hazard situations should be reported to a sink node with as little ...
Jorge Simão
ECIS
2004
13 years 6 months ago
Inter-organizational collaboration and value creation in the automotive industry
In response to the difficulties experienced by the automotive industry in adopting new procurement technology this research investigates an emerging phenomenon: electronic interor...
Mickey Howard, Philip Powell, Richard T. Vidgen