Sciweavers

8493 search results - page 1329 / 1699
» Implementing a distributed firewall
Sort
View
IFM
2004
Springer
104views Formal Methods» more  IFM 2004»
15 years 10 months ago
Linking CSP-OZ with UML and Java: A Case Study
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engine...
Michael Möller, Ernst-Rüdiger Olderog, H...
162
Voted
IJCNLP
2004
Springer
15 years 10 months ago
Window-Based Method for Information Retrieval
In this paper, a series of window-based methods is proposed for information retrieval. Compared with traditional tf-idf model, our approaches are based on two new key notions. The ...
Qianli Jin, Jun Zhao, Bo Xu
IPTPS
2004
Springer
15 years 10 months ago
The Case for a Hybrid P2P Search Infrastructure
Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based search techniques to locate files. Whil...
Boon Thau Loo, Ryan Huebsch, Ion Stoica, Joseph M....
ISER
2004
Springer
173views Robotics» more  ISER 2004»
15 years 10 months ago
Synergies in Feature Localization by Air-Ground Robot Teams
Abstract. This paper describes the implementation of a decentralized architecture for autonomous teams of aerial and ground vehicles engaged in active perception. We provide a theo...
Ben Grocholsky, Selcuk Bayraktar, Vijay Kumar, Cam...
139
Voted
IWAN
2004
Springer
15 years 10 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
« Prev « First page 1329 / 1699 Last » Next »