Sciweavers

2503 search results - page 301 / 501
» Building Computer Network Attacks
Sort
View
76
Voted
GI
2001
Springer
15 years 6 months ago
Personal Information Agent
Abstract: Information overflow is one of the greatest challenges for information focused professions today. This paper presents the Personal Information Agent, an agent based info...
Dominik Kuropka, Thomas Serries
101
Voted
ISMB
2000
15 years 3 months ago
A Pragmatic Information Extraction Strategy for Gathering Data on Genetic Interactions
We present in this paper a pragmatic strategy to perform information extraction from biologic texts. Since the emergence of the information extraction field, techniques have evolv...
Denys Proux, François Rechenmann, Laurent J...
QSHINE
2005
IEEE
15 years 7 months ago
Utility-based Adaptive Resource Allocation in Hybrid Wireless Networks
Service availability in wireless networks is highly dependent on efficient resource allocation and guaranteed Quality of Service (QoS) amid overloads and failures. This paper add...
Calin Curescu, Simin Nadjm-Tehrani, Bing Cao, Tere...
109
Voted
ICNP
2003
IEEE
15 years 7 months ago
Delay Analysis of IEEE 802.11 in Single-Hop Networks
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contr...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
DSOM
1999
Springer
15 years 6 months ago
Integrating Service and Network Management Components for Service Fulfilment
: Solutions in the network and service management layers of telecommunications management architectures are currently fragmented both in terms of standards and products. It is ofte...
David Lewis, Chris Malbon, George Pavlou, Costas S...