Sciweavers

4815 search results - page 920 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
RTCSA
2009
IEEE
15 years 8 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
AH
2008
Springer
15 years 8 months ago
Concept-Based Document Recommendations for CiteSeer Authors
The information explosion in today’s electronic world has created the need for information filtering techniques that help users filter out extraneous content to identify the righ...
Kannan Chandrasekaran, Susan Gauch, Praveen Lakkar...
OTM
2007
Springer
15 years 8 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
CIMCA
2006
IEEE
15 years 8 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
ATAL
2005
Springer
15 years 7 months ago
Multiagent coordination by Extended Markov Tracking
We present here Extended Markov Tracking (EMT), a computationally tractable method for the online estimation of Markovian system dynamics, along with experimental support for its ...
Zinovi Rabinovich, Jeffrey S. Rosenschein