Sciweavers

1575 search results - page 198 / 315
» The provenance of electronic data
Sort
View
TASE
2008
IEEE
15 years 6 months ago
Verifying BPEL-Like Programs with Hoare Logic
The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechan...
Chenguang Luo, Shengchao Qin, Zongyan Qiu
ACIVS
2008
Springer
15 years 6 months ago
Foliage Recognition Based on Local Edge Information
In many real-world object recognition applications, texture plays a very important role. Much research has gone into texture-based segmentation methods, which focus on finding the...
David Van Hamme, Peter Veelaert, Wilfried Philips,...
ICDCS
2007
IEEE
15 years 6 months ago
Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks
Contour mapping is a crucial part of many wireless sensor network applications. Many efforts have been made to avoid collecting data from all the sensors in the network and produc...
Yunhao Liu, Mo Li
ICNP
2007
IEEE
15 years 6 months ago
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs
—We present a game-theoretic study on the power and rate control problem in IEEE 802.11 WLANs where network participants choose appropriate transmission power and data rate to ac...
Lin Chen, Jean Leneutre
INFOCOM
2007
IEEE
15 years 6 months ago
Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks
— The forthcoming 4G cellular systems will provide broadband wireless access to a variety of advanced data and voice services. In order to do that, these networks will have a sig...
David Amzallag, Joseph Naor, Danny Raz