Sciweavers

2421 search results - page 57 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ADHOCNOW
2008
Springer
15 years 7 months ago
DIN: An Ad-Hoc Algorithm to Estimate Distances in Wireless Sensor Networks
Abstract. A current challenge in wireless sensor networks is the positioning of sensor nodes for indoor environments without dedicated hardware. Especially in this domain, many app...
Freddy López Villafuerte, Jochen H. Schille...
220
Voted
SERA
2007
Springer
15 years 6 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
91
Voted
WWW
2007
ACM
16 years 1 months ago
Integrating value-based requirement engineering models to webml using vip business modeling framework
Requirement engineering (RE) is emerging as an increasingly important discipline for supporting Web application development, as these are designed to satisfy diverse stakeholder n...
Farooque Azam, Zhang Li, Rashid Ahmad
109
Voted
ITNG
2010
IEEE
15 years 5 months ago
Applying Semantic Web Techniques to Reservoir Engineering: Challenges and Experiences from Event Modeling
—In reservoir engineering domain experts deal with many tasks and operations, ranging from reservoir simulation to well maintenance scheduling, with the goal of maximizing oil pr...
Tao Zhu, Amol Bakshi, Viktor K. Prasanna, Karthik ...
122
Voted
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 20 days ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...