Sciweavers

5374 search results - page 1060 / 1075
» The induction of communication protocols
Sort
View
IMC
2007
ACM
15 years 1 months ago
Quality-of-service class specific traffic matrices in ip/mpls networks
In this paper we consider the problem of determining traffic matrices for end-to-end demands in an IP/MPLS network that supports multiple quality of service (QoS) classes. More pr...
Stefan Schnitter, Franz Hartleb, Martin Horneffer
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 1 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
PEWASUN
2007
ACM
15 years 1 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
EUMAS
2006
15 years 1 months ago
A Customizable Multi-Agent System for Distributed Data Mining
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Giancarlo Fortino, Giuseppe Di Fatta
ECSCW
2003
15 years 1 months ago
Informing the Development of Calendar Systems for Domestic Use
This paper contributes to the design of Groupware Calendar Systems (GCSs) for use in domestic life. We consider a number of ethnographic studies of calendar use in domestic circums...
Andy Crabtree, Terry Hemmings, Tom Rodden, John A....
« Prev « First page 1060 / 1075 Last » Next »