Sciweavers

476 search results - page 74 / 96
» iOPEN Network: Operation Mechanisms and Experimental Study
Sort
View
HT
2010
ACM
15 years 2 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
CASCON
1996
126views Education» more  CASCON 1996»
15 years 1 months ago
Evaluating the costs of management: a distributed applications management testbed
In today's distributed computing environments, users are makingincreasing demands on the systems, networks, and applications they use. Users are coming to expect performance,...
Michael Katchabaw, Stephen L. Howard, Andrew D. Ma...
IJFCS
2006
130views more  IJFCS 2006»
15 years 13 days ago
Mealy multiset automata
We introduce the networks of Mealy multiset automata, and study their computational power. The networks of Mealy multiset automata are computationally complete. 1 Learning from Mo...
Gabriel Ciobanu, Viorel Mihai Gontineac
100
Voted
ADAEUROPE
2008
Springer
15 years 6 months ago
Fast Scheduling of Distributable Real-Time Threads with Assured End-to-End Timeliness
We consider networked, embedded real-time systems that operate under run-time uncertainties on activity execution times and arrivals, node failures, and message losses. We consider...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
127
Voted
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 13 days ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang