Sciweavers

3008 search results - page 490 / 602
» Mechanisms for Importing Modules
Sort
View
IJWBC
2011
88views more  IJWBC 2011»
14 years 5 months ago
Personal profiles: enhancing social interaction in learning networks
Nowadays, we witness a surge of online profiling sites; in them people make their profile available to others with the intention to share it and get in touch with others, find old ...
Adriana J. Berlanga, Marlies Bitter-Rijpkema, Fran...
ISCI
2011
14 years 5 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
JAIR
2011
133views more  JAIR 2011»
14 years 5 months ago
A Probabilistic Approach for Maintaining Trust Based on Evidence
Leading agent-based trust models address two important needs. First, they show how an agent may estimate the trustworthiness of another agent based on prior interactions. Second, ...
Yonghong Wang, Chung-Wei Hang, Munindar P. Singh
JSAC
2011
115views more  JSAC 2011»
14 years 5 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
MIS
2011
Springer
256views Multimedia» more  MIS 2011»
14 years 5 months ago
Event sharing in vehicular networks using geographic vectors and maps
By exchanging events in a vehicular ad hoc network (VANET), drivers can receive information that allows them to find relevant places (e.g., parking spaces) or avoid dangerous/unde...
Thierry Delot, Sergio Ilarri, Nicolas Cenerario, T...