Sciweavers

254 search results - page 40 / 51
» Policy-Driven Configuration and Management of Agent Based Di...
Sort
View
WWW
2002
ACM
15 years 10 months ago
A pragmatic application of the semantic web using SemTalk
The Semantic Web is a new layer of the Internet that enables semantic representation of the contents of existing web pages. Using common ontologies, human users sketch out the mos...
Christian Fillies, Gay Wood-Albrecht, Frauke Weich...
LISA
1998
14 years 10 months ago
SEPP: Software Installation and Sharing System
SEPP is an application installation, sharing and packaging solution for large, decentrally managed Unix environments. SEPP can be used without making modifications to the organiza...
Tobias Oetiker
ECAI
2000
Springer
15 years 1 months ago
Scheduling Meetings Using Distributed Valued Constraint Satisfaction Algorithm
Abstract. Scheduling meetings is generally difficult in that it attempts to satisfy the preferences of all participants. However, all participants can agree to a schedule in which...
Takuo Tsuruta, Toramatsu Shintani
ICS
2009
Tsinghua U.
14 years 7 months ago
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems
Data de-duplication has become a commodity component in dataintensive systems and it is required that these systems provide high reliability comparable to others. Unfortunately, b...
Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongshen...
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 2 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha