Sciweavers

4477 search results - page 800 / 896
» Applications and Environments for Multi-agent Systems
Sort
View
ISI
2004
Springer
15 years 3 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
MIDDLEWARE
2004
Springer
15 years 3 months ago
Enabling collaborative adaptation across legacy components
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...
VLDB
2004
ACM
143views Database» more  VLDB 2004»
15 years 3 months ago
GPX: Interactive Mining of Gene Expression Data
Discovering co-expressed genes and coherent expression patterns in gene expression data is an important data analysis task in bioinformatics research and biomedical applications. ...
Daxin Jiang, Jian Pei, Aidong Zhang
WWIC
2004
Springer
123views Communications» more  WWIC 2004»
15 years 3 months ago
Experimental Analysis of Heterogeneous Wireless Networks
Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In novel network scenarios where wired and wireless connec...
Giulio Iannello, Antonio Pescapè, Giorgio V...
INFOCOM
2003
IEEE
15 years 3 months ago
EMPOWER: A Network Emulator for Wireless and Wireline Networks
— The increasing need of protocol development environments and network performance evaluation tools gives rise to the research of flexible, scalable, and accurate network emulato...
Pei Zheng, Lionel M. Ni