Sciweavers

343 search results - page 31 / 69
» Normal State Implicature
Sort
View
79
Voted
VTC
2006
IEEE
179views Communications» more  VTC 2006»
15 years 3 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
ICARIS
2005
Springer
15 years 3 months ago
Immunising Automated Teller Machines
Abstract. This paper presents an immune-inspired adaptable error detection (AED) framework for Automated Teller Machines (ATMs). This framework two levels, one level is local to a ...
Modupe Ayara, Jon Timmis, Rogério de Lemos,...
56
Voted
SEKE
2004
Springer
15 years 3 months ago
AgentService
This paper describes the software infrastructure introduced within the AgentService framework in order to provide support for ontology design, development, and management. Ontolog...
Antonio Boccalatte, Andrea Gozzi, Alberto Grosso, ...
ISQED
2003
IEEE
104views Hardware» more  ISQED 2003»
15 years 3 months ago
Elimination of false aggressors using the functional relationship for full-chip crosstalk analysis
As the portion of coupling capacitance increases in smaller process geometries, accurate coupled noise analysis is becoming more important in current design methodologies. We prop...
Jae-Seok Yang, Jeong-Yeol Kim, Joon-Ho Choi, Moon-...
90
Voted
ICDCSW
2002
IEEE
15 years 2 months ago
A Demand based Algorithm for Rapid Updating of Replicas
In many Internet scale replicated system, not all replicas can be dealt with in the same way, since some will be in greater demand than others. In the case of weak consistency algo...
Jesús Acosta-Elías, Leandro Navarro-...