Sciweavers

15782 search results - page 2921 / 3157
» Network Optimization and Control
Sort
View
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
191
Voted
DAMAS
2005
Springer
15 years 9 months ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...
159
Voted
ISI
2005
Springer
15 years 9 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
135
Voted
HT
2004
ACM
15 years 9 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
15 years 9 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
« Prev « First page 2921 / 3157 Last » Next »