Sciweavers

6582 search results - page 1286 / 1317
» The focus of attention problem
Sort
View
CN
2007
91views more  CN 2007»
14 years 11 months ago
On investigating overlay service topologies
Recently, a moderate amount of work has been reported on the use of overlay networks to support value-added network services, such as multicasting, Quality of Service (QoS), secur...
Zhi Li, Prasant Mohapatra
JAIR
2008
108views more  JAIR 2008»
14 years 11 months ago
A Multiagent Approach to Autonomous Intersection Management
Artificial intelligence research is ushering in a new era of sophisticated, mass-market transportation technology. While computers can already fly a passenger jet better than a tr...
Kurt M. Dresner, Peter Stone
IJNSEC
2006
96views more  IJNSEC 2006»
14 years 11 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
IJNSEC
2006
200views more  IJNSEC 2006»
14 years 11 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
CORR
2007
Springer
124views Education» more  CORR 2007»
14 years 11 months ago
An exploratory study of Google Scholar
Purpose – This paper2 discusses the new scientific search service Google Scholar (GS). This search engine, intended for searching exclusively scholarly documents, will be descri...
Philipp Mayr, Anne-Kathrin Walter
« Prev « First page 1286 / 1317 Last » Next »