Sciweavers

1804 search results - page 320 / 361
» Towards P2P Information Systems
Sort
View
ESWS
2008
Springer
14 years 10 months ago
A Core Ontology for Business Process Analysis
Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organisations. An important step of the BPM life-cy...
Carlos Pedrinaci, John Domingue, Ana Karla Alves d...
COMSUR
2007
101views more  COMSUR 2007»
14 years 9 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
JSAC
2008
106views more  JSAC 2008»
14 years 9 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...
JFR
2007
131views more  JFR 2007»
14 years 9 months ago
Adaptive teams of autonomous aerial and ground robots for situational awareness
In this paper, we report on the integration challenges of the various component technologies developed towards the establishment of a framework for deploying an adaptive system of...
M. Ani Hsieh, Anthony Cowley, James F. Keller, Lui...
TON
2010
122views more  TON 2010»
14 years 8 months ago
The (in)completeness of the observed internet AS-level structure
— Despite significant efforts to obtain an accurate picture of the Internet’s connectivity structure at the level of individual autonomous systems (ASes), much has remained un...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...