Sciweavers

341 search results - page 24 / 69
» Permeability Analysis based on information granulation theor...
Sort
View
JNW
2008
167views more  JNW 2008»
14 years 9 months ago
Analyzing the ENRON Communication Network Using Agent-Based Simulation
Agent-based modeling, simulation, and network analysis approaches are one of the emergent techniques among soft computing literature. This paper presents an agent-based model for a...
Shinako Matsuyama, Takao Terano
AIMSA
2006
Springer
15 years 1 months ago
Property Based Coordination
For a multiagent system (MAS), coordination is the assumption that agents are able to adapt their behavior according to those of the other agents. The principle of Property Based C...
Mahdi Zargayouna, Julien Saunier, Flavien Balbo
ENTER
2007
Springer
15 years 4 months ago
The Contribution of Technology-Based Heritage Interpretation to the Visitor Satisfaction in Museums
The tradition of heritage interpretation is moving away from purely conservational and educational goals to an entertainment- and experience-oriented interpretative provision. New...
Sofía Reino, Nicole Mitsche, Andrew J. Frew
SERA
2007
Springer
15 years 3 months ago
Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning
Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of spec...
Nalini Vasudevan, Gowri C. Parthasarathy
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...