Sciweavers

1748 search results - page 338 / 350
» Security Models for Heterogeneous Networking
Sort
View
BPSC
2010
194views Business» more  BPSC 2010»
14 years 10 months ago
Ad-hoc Management Capabilities for Distributed Business Processes
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...
Sonja Zaplata, Dirk Bade, Kristof Hamann, Winfried...
PODC
2009
ACM
16 years 7 days ago
Brief announcement: global consistency can be easier than point-to-point communication
Global consistency or Byzantine Agreement (BA) and reliable point-to-point communication are two of the most important and well-studied problems in distributed computing. Informal...
Prasant Gopal, Anuj Gupta, Pranav K. Vasishta, Piy...
AINA
2010
IEEE
15 years 4 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 8 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
80
Voted
GLOBECOM
2009
IEEE
15 years 6 months ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu