Sciweavers

8468 search results - page 1467 / 1694
» The Technology of Data Stashing
Sort
View
SNPD
2008
15 years 12 days ago
Aggregate Congestion Control for Peer-to-Peer File Sharing Applications
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...
Wei Li, Shanzhi Chen, Yaning Liu, Xin Li
AAAI
2004
15 years 12 days ago
A Qualitative-Quantitative Methods-Based e-Learning Support System in Economic Education
This paper describes a new qualitative-quantitative simulator to help buyers learn how to make decisions when they purchase goods. In this paper, we propose an elearning support s...
Tokuro Matsuo, Takayuki Ito, Toramatsu Shintani
AIPS
2004
15 years 12 days ago
Decision-Theoretic Military Operations Planning
Military operations planning involves concurrent actions, resource assignment, and conflicting costs. Individual tasks sometimes fail with a known probability, promoting a decisio...
Douglas Aberdeen, Sylvie Thiébaux, Lin Zhan...
AISM
2004
15 years 12 days ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
ACSW
2006
15 years 12 days ago
Toward building grid applications in bioinformatics
In silico bioinformatics experiments involve integration of and access to computational tools and biological databases. The emerging grid computing technologies enable bioinformat...
Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro ...
« Prev « First page 1467 / 1694 Last » Next »