Sciweavers

8766 search results - page 1396 / 1754
» Functional logic programming
Sort
View
CCR
2006
76views more  CCR 2006»
15 years 4 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
IJOE
2008
120views more  IJOE 2008»
15 years 4 months ago
Application of the Control Validation to the D.E.S. Teaching
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors a...
Pascale Marange, François Gellot, Bernard R...
GRID
2006
Springer
15 years 4 months ago
Campus Grids Meet Applications: Modeling, Metascheduling and Integration
Air Quality Forecasting (AQF) is a new discipline that attempts to reliably predict atmospheric pollution. An AQF application has complex workflows and in order to produce timely ...
Yonghong Yan, Barbara M. Chapman
JAIR
2008
123views more  JAIR 2008»
15 years 4 months ago
CTL Model Update for System Modifications
Model checking is a promising technology, which has been applied for verification of many hardware and software systems. In this paper, we introduce the concept of model update to...
Yan Zhang, Yulin Ding
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
15 years 4 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
« Prev « First page 1396 / 1754 Last » Next »