Sciweavers

5518 search results - page 996 / 1104
» Rule-Based Service Modeling
Sort
View
NETWORKING
2008
15 years 2 months ago
Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks
Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if ...
Haiyong Xie 0002, Yang Richard Yang, Avi Silbersch...
IQ
2007
15 years 2 months ago
A Flexible And Generic Data Quality Metamodel
: DQ metadata can be stored in a Metadata Repository (MDR). The structure of the MDR should be carefully defined to ensure a maximum amount of flexibility, generality and ease of u...
David Becker, William McMullen, Kevin Hetherington...
ISTA
2007
15 years 2 months ago
Towards Information Management System for Licensing in Higher Education: An Ontology-Based Approach
Higher education licensing, i.e. the process of granting permissions to provide certain educational services, is an important process of public administration. Governmental bodies ...
Olga Cherednichenko, Dmytro Kuklenko, Sergiy Zlatk...
AOIS
2006
15 years 2 months ago
Providing Contextual Norm Information in Open Multi-Agent Systems
Agents can freely migrate among open MASs in order to obtain resources or services not found locally. In this scenario, agent actions should be guided for avoiding unexpected behav...
Carolina Howard Felicíssimo, Ricardo Choren...
CSREASAM
2006
15 years 2 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam