Sciweavers

3544 search results - page 609 / 709
» Information Security in Open Systems
Sort
View
NETWORKING
2008
15 years 16 days ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...
IMSA
2001
131views Multimedia» more  IMSA 2001»
15 years 14 days ago
SORBA: Shared Object Request Broker Architecture for Peer Computing
: In this paper, we proposed a SORBA (Shared Object Request Broker Architecture) model, an objectbased P2P model, which complies with an open architecture, and manages resources af...
U. G. Kang, H. J. Hwang, S. H. Lee, C. J. Wang
82
Voted
HPDC
2010
IEEE
15 years 5 days ago
Early observations on the performance of Windows Azure
A significant open issue in cloud computing is performance. Few, if any, cloud providers or technologies offer quantitative performance guarantees. Regardless of the potential adv...
Zach Hill, Jie Li, Ming Mao, Arkaitz Ruiz-Alvarez,...
AO
2007
111views more  AO 2007»
14 years 11 months ago
Let's talk about our "being": A linguistic-based ontology framework for coordinating agents
Abstract. In open scenarios, agents willing to cooperate must impact the communication barrier between them and their unknown partners. If agents are not relying on any agreement a...
Maria Teresa Pazienza, Savino Sguera, Armando Stel...
JDM
2006
96views more  JDM 2006»
14 years 11 months ago
Preparing Clinical Text for Use in Biomedical Research
Approximately 57 different types of clinical annotations construct a patient's medical record. The annotations include radiology reports, discharge summaries, and surgical an...
John Pestian, Lukasz Itert, Charlotte Anderson, Wl...