Search
Now showing items 41-49 of 49
Non-procedural Implementation of Local Heuristic Search in Control Network Programming
(SPRINGER-VERLAG BERLIN, 2010)
The report describes the type of improved uninformed or heuristic search algorithms that are well-suited for non-procedural implementation in Control network programming, and how this can be achieved using the tools for ...
Control Network Programming with SPIDER: Dynamic Search Control
(SPRINGER-VERLAG BERLIN, 2010)
The report describes the means for dynamic control of the computation process that are available in Spider - a language for Control Network Programming.
A Layered Security Approach for Cloud Computing Infrastructure
(IEEE, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(MDPI, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLAN
(SPRINGER-VERLAG BERLIN, 2010)
As the demand for uninterrupted Internet access grows, the popularity of wireless communication increases. However, wireless communication has some problems compared to conventional wired communication. Especially, if ...
A desktop application to learn the actual workload of the students
(ELSEVIER SCIENCE BV, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...
Semantic Access Control for Corporate Mobile Devices
(SPRINGER-VERLAG BERLIN, 2010)
Many of the mobile business applications are executed in different domains as business-to-consumer (B2C) and business-to-business (B2B) operations. Computing environments of mobile wireless devices owned by individuals or ...
Benefits of semantic approach in the learning environment
(ELSEVIER SCIENCE BV, 2011)
Mobile devices are mainly lack of regular user interfaces that facilitate the human-computer interaction and the access to network resources. However, almost all commercial applications contain their mobile versions. If ...
Benefits and challenges of cloud computing in production and service sector in izmir, the city of turkey
(Humanities and Social Sciences Reviews, 2020)
Purpose of the study: This research aims to understand the benefits and challenges of cloud and non-cloud adopter companies of production and service sectors on cloud computing and making recommendations based on companies’ ...