Sciweavers

14306 search results - page 2770 / 2862
» Database System Concepts
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
IWAN
2000
Springer
15 years 1 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...
KDD
2000
ACM
162views Data Mining» more  KDD 2000»
15 years 1 months ago
Data Mining from Functional Brain Images
Recent advances in functional brain imaging enable identication of active areas of a brain performing a certain function. Induction of logical formulas describing relations betwee...
Mitsuru Kakimoto, Chie Morita, Yoshiaki Kikuchi, H...
MATA
2000
Springer
137views Communications» more  MATA 2000»
15 years 1 months ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...
GPCE
2009
Springer
15 years 1 months ago
Mapping problem-space to solution-space features: a feature interaction approach
Mapping problem-space features into solution-space features is a fundamental configuration problem in software product line engineering. A configuration problem is defined as g...
Frans Sanen, Eddy Truyen, Wouter Joosen
« Prev « First page 2770 / 2862 Last » Next »