Sciweavers

1054 search results - page 89 / 211
» Determining Computing Science's Role
Sort
View
KSEM
2007
Springer
15 years 6 months ago
On Defense Strength of Blocking Defeaters in Admissible Sets
Extended argumentation framework is a formalism where defeat relations are determined by establishing a preference between arguments involved in symmetric conflicts. This process ...
Diego C. Martínez, Alejandro Javier Garc&ia...
IMSCCS
2006
IEEE
15 years 5 months ago
A Vertical Handover Decision Algorithm Based on Fuzzy Control Theory
The paper mainly deals with a vertical handover decision algorithm based on the fuzzy control theory. The algorithm takes into consider the factors of Power Level, Cost and Bandwi...
Hongwei Liao, Ling Tie, Zhao Du
JDA
2008
85views more  JDA 2008»
14 years 12 months ago
A robust randomized algorithm to perform independent tasks
The Do-All problem is about scheduling t similar and independent tasks to be performed by p processors prone to crashes. We assume that the distributed system is synchronous with ...
Bogdan S. Chlebus, Leszek Gasieniec, Dariusz R. Ko...
NETWORKS
2008
14 years 11 months ago
A Reach and Bound algorithm for acyclic dynamic-programming networks
Node pruning is a commonly used technique for solution acceleration in a dynamic programming network. In pruning, nodes are adaptively removed from the dynamic programming network...
Matthew D. Bailey, Robert L. Smith, Jeffrey M. Ald...
CSE
2009
IEEE
15 years 6 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...