Sciweavers

2580 search results - page 362 / 516
» Systems for human-powered mobile computing
Sort
View
CONCUR
2006
Springer
15 years 8 months ago
Concurrent Rewriting for Graphs with Equivalences
Several applications of graph rewriting systems (notably, some encodings of calculi with name passing) require rules which, besides deleting and generating graph items, are able to...
Paolo Baldan, Fabio Gadducci, Ugo Montanari
APNOMS
2006
Springer
15 years 8 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 5 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
CHI
2005
ACM
16 years 4 months ago
TXTmob: text messaging for protest swarms
This paper describes cell phone text messaging during the 2004 US Democratic and Republican National Conventions by protesters using TXTmob ? a text-message broadcast system devel...
Tad Hirsch, John Henry
ICCS
2007
Springer
15 years 10 months ago
Autonomic Workflow Management in the Grid
The autonomic workflow engine enables workflow to be dynamically specified and adapted using Event-Condition-Action rules. A new approach to autonomic execution of workflow process...
Guangsheng Zhang, Changjun Jiang, Jing Sha, Ping S...