Sciweavers

2500 search results - page 386 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
JNW
2008
128views more  JNW 2008»
14 years 10 months ago
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services
Web services paradigm is allowing applications to electronically interact with one another over the Internet. The business process execution language (BPEL) takes this ion to a hig...
Onyeka Ezenwoye, Seyed Masoud Sadjadi
JMLR
2006
104views more  JMLR 2006»
14 years 10 months ago
Learning Image Components for Object Recognition
In order to perform object recognition it is necessary to learn representations of the underlying components of images. Such components correspond to objects, object-parts, or fea...
Michael W. Spratling
AIR
2005
158views more  AIR 2005»
14 years 10 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
JHSN
2000
86views more  JHSN 2000»
14 years 9 months ago
Alert communication primitives above TCP
We consider communication primitives that can be executed by an application process to exchange messages with another application process over a TCP/IP network. A communication pri...
Mohamed G. Gouda, Tommy M. McGuire
SEUS
2010
IEEE
14 years 7 months ago
Ubiquitous Verification of Ubiquitous Systems
Abstract. Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned...
Reinhard Wilhelm, Matteo Maffei