Sciweavers

983 search results - page 117 / 197
» A Better Update Policy
Sort
View
CCE
2007
13 years 9 months ago
Design and control of recycle systems by non-linear analysis
Design and control of recycle systems must be integrated at an early design stage. By placing together the pieces of the design puzzle we developed a novel methodology that allows...
Anton A. Kiss, Costin S. Bildea, Alexandre C. Dimi...
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 9 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
ISI
2006
Springer
13 years 9 months ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen
JCM
2006
79views more  JCM 2006»
13 years 8 months ago
Multi-Service: A Service Aware Routing Protocol for the Next Generation Internet
Quality of Service support plays a major role in the Next Generation Internet. QoS routing protocols must cope with service differentiation to enhance this support. This paper prop...
António Varela, Teresa Vazão, Guilhe...
JSS
2006
118views more  JSS 2006»
13 years 8 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun