Sciweavers

9316 search results - page 1716 / 1864
» Analysis of traceback techniques
Sort
View
DFN
2003
15 years 5 months ago
Government mandated blocking of foreign Web content
: Blocking of foreign Web content by Internet access providers has been a hot topic for the last 18 months in Germany. Since fall 2001 the state of North-RhineWestphalia very activ...
Maximillian Dornseif
EUSFLAT
2003
131views Fuzzy Logic» more  EUSFLAT 2003»
15 years 5 months ago
From communication networks to fuzzy sets
In 1931 and 1935, Ernst Adolph Guillemin, professor of electrical engineering at Masachusetts Institute of Technology (MIT), published the two volumes of his book “Communication...
Rudolf Seising
IADIS
2003
15 years 5 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
WSC
2004
15 years 5 months ago
Building Credible Input Models
Most discrete-event simulation models have stochastic elements that mimic the probabilistic nature of the system under consideration. A close match between the input model and the...
Lawrence Leemis
OPODIS
2003
15 years 5 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
« Prev « First page 1716 / 1864 Last » Next »