Sciweavers

14382 search results - page 2667 / 2877
» Time in Connectionist Models
Sort
View
150
Voted
MSWIM
2005
ACM
15 years 9 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
PADS
2005
ACM
15 years 9 months ago
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
Most well-known Internet worms, such as Code Red, Slammer, and Blaster, infected vulnerable computers by scanning the entire Internet IPv4 space. In this paper, we present a new s...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong...
127
Voted
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
15 years 9 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...
129
Voted
WS
2005
ACM
15 years 9 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
154
Voted
ATAL
2005
Springer
15 years 9 months ago
A multiagent system manages collaboration in emergent processes
Emergent processes are non-routine, collaborative business processes whose execution is guided by the knowledge that emerges during a process instance. In so far as the process go...
John K. Debenham
« Prev « First page 2667 / 2877 Last » Next »