Sciweavers

2913 search results - page 210 / 583
» How Much to Copy
Sort
View
INFOCOM
2009
IEEE
15 years 7 months ago
Encounter-Based Routing in DTNs
—Current work in routing protocols for delay and disruption tolerant networks leverage epidemic-style algorithms that trade off injecting many copies of messages into the network...
Samuel C. Nelson, Mehedi Bakht, Robin Kravets
RTA
2009
Springer
15 years 7 months ago
A Heterogeneous Pushout Approach to Term-Graph Transformation
We address the problem of cyclic termgraph rewriting. We propose a new framework where rewrite rules are tuples of the form (L, R, τ, σ) such that L and R are termgraphs represen...
Dominique Duval, Rachid Echahed, Fréd&eacut...
97
Voted
SUM
2009
Springer
15 years 7 months ago
An Argument-Based Approach to Using Multiple Ontologies
Abstract. Logic-based argumentation offers an approach to querying and revising multiple ontologies that are inconsistent or incoherent. A common assumption for logic-based argumen...
Elizabeth Black, Anthony Hunter, Jeff Z. Pan
105
Voted
ICCCN
2008
IEEE
15 years 7 months ago
Policy Distribution Methods for Function Parallel Firewalls
—Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving p...
Michael R. Horvath, Errin W. Fulp, Patrick Wheeler
97
Voted
WCRE
2008
IEEE
15 years 7 months ago
Detecting Clones in Business Applications
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by followi...
Jin Guo, Ying Zou