Sciweavers

2562 search results - page 506 / 513
» The Use of B2B Process Standards: A Case Study
Sort
View
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
15 years 10 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
INFOCOM
2009
IEEE
15 years 4 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
CSFW
2008
IEEE
15 years 4 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
AOSE
2005
Springer
15 years 3 months ago
Zooming Multi-Agent Systems
Abstract Complex systems call for a hierarchical description. Analogously, the engineering of non-trivial MASs (multiagent systems) requires principles and mechanisms for a multi-l...
Ambra Molesini, Andrea Omicini, Alessandro Ricci, ...
INFOCOM
2003
IEEE
15 years 2 months ago
Measurement-Based Optimization Techniques for Bandwidth-Demanding Peer-to-Peer Systems
— Measurement-based optimization is one important strategy to improve the performance of bandwidth-demanding peer-to-peer systems. However, to date, we have little quantitative k...
T. S. Eugene Ng, Yang-Hua Chu, Sanjay G. Rao, Kunw...