Sciweavers

5723 search results - page 1006 / 1145
» Network Management
Sort
View
ICALT
2009
IEEE
15 years 10 months ago
iCoper Best Practice Uses Cases and Standards for Learning Delivery
This conceptual paper outlines best practice use cases and standards for learning delivery that are the result of a European-wide best practice case study survey within the EU-fun...
Daniel Mueller, Volker Zimmermann
144
Voted
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 10 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICDCSW
2009
IEEE
15 years 10 months ago
A Dynamic Battery Model for Co-design in Cyber-Physical Systems
We introduce a dynamic battery model that describes the variations of the capacity of a battery under time varying discharge current. This model supports a co-design approach for ...
Fumin Zhang, Zhenwu Shi, Wayne Wolf
ICDIM
2009
IEEE
15 years 10 months ago
Augmenting the exploration of digital libraries with web-based visualizations
Web-based digital libraries have sped up the process that scholars use to find new, important research papers. Unfortunately, current digital libraries are limited by their inade...
Peter Bergstrom, Darren C. Atkinson
WEBI
2009
Springer
15 years 10 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
« Prev « First page 1006 / 1145 Last » Next »