Sciweavers

5470 search results - page 1042 / 1094
» Enterprise Information Architecture
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
IPPS
2009
IEEE
15 years 4 months ago
Portable builds of HPC applications on diverse target platforms
—High-end machines at modern HPC centers are constantly undergoing hardware and system software upgrades – necessitating frequent rebuilds of application codes. The number of p...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
ATAL
2009
Springer
15 years 4 months ago
Bounded rationality via recursion
Current trends in model construction in the field of agentbased computational economics base behavior of agents on either game theoretic procedures (e.g. belief learning, fictit...
Maciej Latek, Robert L. Axtell, Bogumil Kaminski
ECOWS
2009
Springer
15 years 4 months ago
Indirect Reciprocity in Policy-Based Helping Experiments
—In service-oriented architectures, participants keep interacting by exchanging tasks, in order to increase their benefit. Since carrying out a task incurs costs, and participan...
Christian von der Weth, Klemens Böhm, Thorben...
OTM
2009
Springer
15 years 4 months ago
Semantic Event Correlation Using Ontologies
Complex event processing (CEP) is a software architecture paradigm that aims at low latency, high throughput, and quick adaptability of applications for supporting and improving ev...
Thomas Moser, Heinz Roth, Szabolcs Rozsnyai, Richa...
« Prev « First page 1042 / 1094 Last » Next »