Sciweavers

8499 search results - page 1683 / 1700
» networking 2007
Sort
View
104
Voted
MIDDLEWARE
2007
Springer
15 years 6 months ago
Fair access to scarce resources in ad-hoc grids using an economic-based approach
In ad-hoc Grids where the availability of resources and tasks changes over the time, distributing the tasks among the scarce resources in a balanced way is a challenging task. In ...
Behnaz Pourebrahimi, Koen Bertels
PREMI
2007
Springer
15 years 6 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron
115
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 6 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
97
Voted
RV
2007
Springer
130views Hardware» more  RV 2007»
15 years 6 months ago
Statistical Runtime Checking of Probabilistic Properties
Probabilistic correctness is another important aspect of reliable systems. A soft real-time system, for instance, exhibits probabilistic behaviors from tolerating some degrees of ...
Usa Sammapun, Insup Lee, Oleg Sokolsky, John Regeh...
SEMWEB
2007
Springer
15 years 6 months ago
Vocabulary Patterns in Free-for-all Collaborative Indexing Systems
In collaborative indexing systems users generate a big amount of metadata by labelling web-based content. These labels are known as tags and form a shared vocabulary. In order to u...
Wolfgang Maass, Tobias Kowatsch, Timo Münster
« Prev « First page 1683 / 1700 Last » Next »