Sciweavers

233 search results - page 36 / 47
» adhoc 2010
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
14 years 10 months ago
Survey of trust models in different network domains
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchang...
Mohammad Momani, Subhash Challa
CIKM
2010
Springer
14 years 8 months ago
What can quantum theory bring to information retrieval
The probabilistic formalism of quantum physics is said to provide a sound basis for building a principled information retrieval framework. Such a framework can be based on the not...
Benjamin Piwowarski, Ingo Frommholz, Mounia Lalmas...
101
Voted
ICA3PP
2010
Springer
14 years 8 months ago
A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols
A new user-friendly visual simulation tool; ViSim is presented. ViSim could be useful for researchers, students, teachers in their works, and for the demonstration of various wirel...
Md. Sabbir Rahman Sakib, Nazmus Saquib, Al-Sakib K...
ICSE
2010
IEEE-ACM
14 years 8 months ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...
ICSE
2010
IEEE-ACM
14 years 8 months ago
Integrating legacy systems with MDE
Integrating several legacy software systems together is commonly performed with multiple applications of the Adapter Design Pattern in oo languages such as Java. The integration i...
Mickael Clavreul, Olivier Barais, Jean-Marc J&eacu...