Sciweavers

3193 search results - page 598 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ITNG
2008
IEEE
14 years 2 months ago
Parallel FFT Algorithms on Network-on-Chips
This paper presents several parallel FFT algorithms with different degree of communication overhead for multiprocessors in Network-on-Chip(NoC) environment. Three different method...
Jun Ho Bahn, Jungsook Yang, Nader Bagherzadeh
VTC
2008
IEEE
158views Communications» more  VTC 2008»
14 years 2 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou
ADBIS
2007
Springer
132views Database» more  ADBIS 2007»
14 years 1 months ago
Clustering Approach to Generalized Pattern Identification Based on Multi-instanced Objects with DARA
Clustering is an essential data mining task with various types of applications. Traditional clustering algorithms are based on a vector space model representation. A relational dat...
Rayner Alfred, Dimitar Kazakov
TCGOV
2005
Springer
14 years 1 months ago
UNICAP: Efficient Decision Support for Academic Resource and Capacity Management
Growing complexity of the data and processes to be managed, as well as the transition from strict governmental regulation towards autonomy make academic institutions a significant ...
Svetlana Vinnik, Marc H. Scholl
CAISE
2004
Springer
14 years 1 months ago
Towards Computer-aided Design of OCL Constraints
In UML2.0, significant efforts have been devoted towards a better definition of OCL. Still, the adoption of the language by the software engineers remains a significant challenge....
Yves Ledru, Sophie Dupuy-Chessa, Hind Fadil