Ara
Toplam kayıt 26, listelenen: 11-20
Control network programming with SPIDER: Dynamic search control
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming. © 2010 Springer-Verlag.
Non-procedural implementation of local heuristic search in control network programming
(Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
Effective use of cloud computing in educational institutions
(Procedia - Social and Behavioral Sciences, 2010)
Cloud computing is becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. It will likely have a significant impact ...
Issues in User Generated Content process and a proposed model to solve them
(International Journal of Technology, Knowledge and Society, 2010)
User-Generated Content (UGC) in cyberspace is an important aspect of knowledge management discipline. We observed that the technical management of UGC has a number of issues and is not undertaken efficiently in large ...
The use of internet resources by university students during their course projects elicitation: A case study
(Turkish Online Journal of Educational Technology, 2010)
Although technology is a very important, useful and indispensable part of the life, effective and appropriate usage of it still needs to be improved in education. This study presents the way university students gather their ...
A layered security approach for cloud computing infrastructure
(I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
A desktop application to learn the actual workload of the students
(Procedia - Social and Behavioral Sciences, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...
Integration of GIS: A showcase study on GML based WebGIS
(Proceedings of SPIE - The International Society for Optical Engineering, 2008)
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(Sensors, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
Face matrix: A quick search and indexing method for suspect recognition in police departments
(Information Technology Journal, 2007)
This study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected ...