Sciweavers

1028 search results - page 204 / 206
» A Framework for Dynamic Service Composition
Sort
View
104
Voted
WWW
2002
ACM
15 years 10 months ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
15 years 9 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
SERSCISA
2009
Springer
15 years 4 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
83
Voted
SSD
2009
Springer
167views Database» more  SSD 2009»
15 years 4 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, ...
93
Voted
ICAC
2008
IEEE
15 years 3 months ago
Utility-Based Reinforcement Learning for Reactive Grids
—Large scale production grids are an important case for autonomic computing. They follow a mutualization paradigm: decision-making (human or automatic) is distributed and largely...
Julien Perez, Cécile Germain-Renaud, Bal&aa...