Sciweavers

11325 search results - page 2095 / 2265
» Active Model Selection
Sort
View
134
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 7 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
136
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning
In this paper, cognitive transmission under quality of service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sen...
Sami Akin, Mustafa Cenk Gursoy
165
Voted
CCGRID
2004
IEEE
15 years 7 months ago
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optical networks
Next generation applications and architectures (for example, Grids) are driving radical changes in the nature of traffic, service models, technology, and cost, creating opportunit...
Tal Lavian, Joe Mambretti, Doug Cutrell, Howard J....
144
Voted
ATAL
2006
Springer
15 years 7 months ago
Integrating agent-oriented methodologies with UML-AT
There are many methodological approaches for Agent-Oriented Software Engineering, each one focusing on some features of multi-agent systems, but leaving others underdefined. For t...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
124
Voted
DSMML
2004
Springer
15 years 7 months ago
Efficient Communication by Breathing
The arithmetic-coding-based communication system, Dasher, can be driven by a one-dimensional continuous signal. A belt-mounted breath-mouse, delivering a signal related to lung vol...
Tom Shorrock, David MacKay, Chris Ball
« Prev « First page 2095 / 2265 Last » Next »