Sciweavers

8080 search results - page 265 / 1616
» From Computer Networks to Agent Networks
Sort
View
IMC
2007
ACM
15 years 5 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
COLCOM
2005
IEEE
15 years 9 months ago
SLACER: randomness to cooperation in peer-to-peer networks
Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an...
David Hales, Stefano Arteconi, Özalp Babaoglu
AICCSA
2008
IEEE
301views Hardware» more  AICCSA 2008»
15 years 6 months ago
Cooperative criminal face recognition in distributed web environment
This paper presents a multi-agent framework for distributed web-based face recognition using fuzzy logic based result fusion mechanism. The model is designed in JADE framework and...
Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad...
ESM
1998
15 years 5 months ago
Developing Interest Management Techniques in Distributed Interactive Simulation Using Java
Bandwidth consumption in distributed real-time simulation, or networked real-time simulation, is a major problem as the number of participants and the sophistication of joint simu...
Jon Saville, Simon J. E. Taylor
INTERSENSE
2006
ACM
15 years 10 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...