Sciweavers

10674 search results - page 2035 / 2135
» The Virtual Environment - Another Approach
Sort
View
SIGMOD
2010
ACM
598views Database» more  SIGMOD 2010»
15 years 8 months ago
Ricardo: integrating R and Hadoop
Many modern enterprises are collecting data at the most detailed level possible, creating data repositories ranging from terabytes to petabytes in size. The ability to apply sophi...
Sudipto Das, Yannis Sismanis, Kevin S. Beyer, Rain...
ECAL
2001
Springer
15 years 8 months ago
Evolving Lives: The Individual Historical Dimension in Evolution
Some benefits of a dialogue between evolutionary robotics and developmental ethology are presented with discussion of how developmental models might inform approaches to evolution...
Rachel Wood
INDOCRYPT
2001
Springer
15 years 8 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
15 years 8 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
ICC
2000
IEEE
241views Communications» more  ICC 2000»
15 years 8 months ago
Power Management for Throughput Enhancement in Wireless Ad-Hoc Networks
—In this paper we introduce the notion of power management within the context of wireless ad-hoc networks. More specifically, we investigate the effects of using different trans...
Tamer A. ElBatt, Srikanth V. Krishnamurthy, Dennis...
« Prev « First page 2035 / 2135 Last » Next »