Sciweavers

8080 search results - page 1609 / 1616
» From Computer Networks to Agent Networks
Sort
View
JFP
2008
72views more  JFP 2008»
14 years 9 months ago
Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction
Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various...
Peter Sewell, Gareth Stoyle, Michael Hicks, Gavin ...
TASE
2008
IEEE
14 years 9 months ago
Group Elevator Scheduling With Advance Information for Normal and Emergency Modes
Group elevator scheduling has long been recognized as an important problem for building transportation efficiency, since unsatisfactory elevator service is one of the major complai...
Peter B. Luh, Bo Xiong, Shi-Chung Chang
74
Voted
AO
2005
147views more  AO 2005»
14 years 9 months ago
Domain modelling and NLP: Formal ontologies? Lexica? Or a bit of both?
There are a number of genuinely open questions concerning the use of domain models in nlp. It would be great if contributors to Applied Ontology could help addressing them rather ...
Massimo Poesio
TMC
2008
112views more  TMC 2008»
14 years 9 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
JCP
2007
121views more  JCP 2007»
14 years 9 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
« Prev « First page 1609 / 1616 Last » Next »