Buch, Englisch, 564 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1770 g
5th International School and Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005, Revised Selected Papers
Buch, Englisch, 564 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1770 g
Reihe: Programming and Software Engineering
ISBN: 978-3-540-28063-7
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik Robotik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering Objektorientierte Softwareentwicklung
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
Weitere Infos & Material
Database Systems.- Database System Architecture – A Walk Through Time: From Centralized Platform to Mobile Computing – Keynote Address.- Extending Wide-Area Replication Support with Mobility and Improved Recovery.- Extending Databases to Precision-Controlled Retrieval of Qualitative Information.- An Approach for Solving Very Large Scale Instances of the Design Distribution Problem for Distributed Database Systems.- Distributed and Parallel Algorithms.- On the Abstraction of Message-Passing Communications Using Algorithmic Skeletons.- Implementing Distributed Mutual Exclusion on Multithreaded Environments: The Alien-Threads Approach.- On Time Analysis of Random Walk Based Token Circulation Algorithms.- Architecture for Media Streaming Delivery over P2P Networks.- On the Role of Information Compaction to Intrusion Detection.- A Hybrid Framework of RR Scheduler to Ensure Priority, Low Complexity and Delay with Relative Fairness.- Data Hiding in Identification and Offset IP Fields.- Interpretation of UML Sequence Diagrams as Causality Flows.- Real-Time Distributed Systems.- A Proposal for On-Line Reconfiguration Based upon a Modification of Planning Scheduler and Fuzzy Logic Control Law Response.- Integrated Tool for Testing Timed Systems.- Conformance Testing of Real-Time Component Based Systems.- Cooperative Information Systems.- Modeling Multiple Interactions Using Coloured Petri Nets: A Case Study.- A Framework for Information Integration with Uncertainty.- Model Fragmentation for Distributed Workflow Execution: A Petri Net Approach.- An Online Component Deployment System for Dynamic Collaborative Sessions.- Complexity in Collaborative Online Socio-Interationist Environments: A Good Reason for Distributed Systems.- Fault Tolerance.- Injecting Communication Faults toExperimentally Validate Java Distributed Applications.- Implementing Rollback-Recovery Coordinated Checkpoints.- Information Retrieval.- An Identity-Based Model for Grid Security Infrastructure.- Lineage Tracing in Mediator-Based Information Integration Systems.- Combining Sources of Evidence for Recognition of Relevant Passages in Texts.- A Hierarchical and by Role Multi-agent Organization: Application to the Information Retrieval.- Modeling and Simulation.- Evaluating a Scientific SPMD Application on a Computational Grid with Different Load Balancing Techniques.- Increasing the Training Speed of SVM, the Zoutendijk Algorithm Case.- Video Motion Detection Using the Algorithm of Discrimination and the Hamming Distance.- An Efficient and Grain Preservation Mapping Algorithm: From ER Diagram to Multidimensional Model.- Quadratic Optimization Fine Tuning for the Learning Phase of SVM.- Wireless Networks and Mobile Computing.- WFCTA(Weighted Fair Channel Time Allocation) and Its Analysis for HR-WPAN.- Performance Analysis of Two Approaches to Service Discovery in Mobile Ad Hoc Networks.- BCTMA (Bi-directional Cut-Through Medium Access) Protocol for 802.11-Based Multi-hop Wireless Networks.- Some Security Issues of Wireless Systems.- Overview the Key Management in Ad Hoc Networks.- On Performance Improvement for 802.11-based Multi-hop Ad Hoc Wireless Networks.- Analysis of Context Transfer in Seamless IP Mobility.- Artificial Life and Multi-agent Systems.- An Introduction to Evolutionary Algorithms and Their Applications.- Distributed Anticipatory System.- Memory as an Active Component of a Behavioral Animation System.- Growing Functional Modules, a Prospective Paradigm for Epigenetic Artificial Intelligence.- Specifying Agent’s Goals in 3D Scenarios Using ProcessAlgebras.- A New Approach for Offer Evaluation in Multi-agent System Negotiation Based in Evidential Paraconsistent Logic.- A Voice-Enabled Assistant in a Multi-agent System for e-Government Services.- CAS – An Interface Generator in Natural Language to Information System.- A Formal Approach to Model Multiagent Interactions Using the B Formal Method.- Behavioral Self-control of Agent-Based Virtual Pedestrians.- ISSADS 2004.- Security Challenges of Distributed e-Learning Systems.- A Component-Based Transactional Service, Including Advanced Transactional Models.