Sciweavers

1580 search results - page 43 / 316
» Non-Interference Through Determinism
Sort
View
96
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 6 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
CLUSTER
2007
IEEE
15 years 5 months ago
Optimal synchronization frequency for dynamic pipelined computations on heterogeneous systems
— In this paper we give a theoretical model for determining the synchronization frequency that minimizes the parallel execution time of loops with uniform dependencies dynamicall...
Florina M. Ciorba, Ioannis Riakiotakis, Theodore A...
APWEB
2005
Springer
15 years 1 months ago
A Neural Network Approach to Web Graph Processing
In this paper, we will provide an overview of some of the more recent developments in web graph processing using the classic Google page rank equation as popularized by Brins and P...
Ah Chung Tsoi, Franco Scarselli, Marco Gori, Marku...
87
Voted
SEMWEB
2010
Springer
14 years 9 months ago
Deciding Agent Orientation on Ontology Mappings
Effective communication in open environments relies on the ability of agents to reach a mutual understanding of the exchanged message by reconciling the vocabulary (ontology) used....
Paul Doran, Terry R. Payne, Valentina A. M. Tamma,...
68
Voted
HCI
2009
14 years 9 months ago
A Study on the Design of Voice Navigation of Car Navigation System
This study tries to find the designing blind spots of the voice prompt function in the current car navigation systems and make improvement suggestions. The experimental plan was im...
Chih-Fu Wu, Wan-Fu Huang, Tung-Chen Wu