Sciweavers

8080 search results - page 1457 / 1616
» From Computer Networks to Agent Networks
Sort
View
109
Voted
ICRA
2003
IEEE
102views Robotics» more  ICRA 2003»
15 years 9 months ago
Two-dimensional signal transmission technology for robotics
The forms of communication available now are categorized into the one or three dimensional. One dimensional communication includes metal wires and optical fibers in which the elec...
Hiroyuki Shinoda, Naoya Asamura, Mitsuhiro Hakozak...
SBACPAD
2003
IEEE
180views Hardware» more  SBACPAD 2003»
15 years 9 months ago
New Parallel Algorithms for Frequent Itemset Mining in Very Large Databases
Frequent itemset mining is a classic problem in data mining. It is a non-supervised process which concerns in finding frequent patterns (or itemsets) hidden in large volumes of d...
Adriano Veloso, Wagner Meira Jr., Srinivasan Parth...
ICDCS
2002
IEEE
15 years 9 months ago
Bidding for Storage Space in a Peer-to-Peer Data Preservation System
Digital archives protect important data collections from failures by making multiple copies at other archives, so that there are always several good copies of a collection. In a c...
Brian F. Cooper, Hector Garcia-Molina
NSF
2001
Springer
197views Computer Vision» more  NSF 2001»
15 years 8 months ago
A Collaborative Infrastructure for Mobile and Wireless Systems
Today‘s use of mobile phones is mostly for coordination purposes. It seems reasonable to assume that 3G and 4G high bandwidth systems will be used in a similar way. This paper th...
Lutz Michael Wegner, Morad Ahmad, Stefan Fröh...
ACSAC
1998
IEEE
15 years 8 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
« Prev « First page 1457 / 1616 Last » Next »