Sciweavers

1242 search results - page 170 / 249
» The Theory of Grammar Constraints
Sort
View
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 7 months ago
Optimal Power Allocation for Amplify-And-Forward Relay Networks via Conic Programming
— Relay power allocation has been shown to provide substantial performance gain in wireless relay channels when perfect global channel state information (CSI) is available. In th...
Tony Q. S. Quek, Moe Z. Win, Hyundong Shin, Marco ...
ESWS
2007
Springer
15 years 7 months ago
Vague Knowledge Bases for Matchmaking in P2P E-Marketplaces
In this paper we propose an approach to semantic matchmaking that exploits various knowledge representation technologies to find most promising partners in peer-to-peer e-marketpl...
Azzurra Ragone, Umberto Straccia, Tommaso Di Noia,...
116
Voted
ISOLA
2007
Springer
15 years 6 months ago
Proved Development of the Real-Time Properties of the IEEE 1394 Root Contention Protocol with the Event B Method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm, Dominique Cansell
123
Voted
SEMWEB
2007
Springer
15 years 6 months ago
The PRIOR+: Results for OAEI Campaign 2007
Ontology mapping is to find semantic correspondences between similar elements of different ontologies. It is critical to achieve semantic interoperability in the WWW. This paper su...
Ming Mao, Yefei Peng
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 6 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer