Sciweavers

262 search results - page 32 / 53
» Architecture and dialogue design for a voice operated inform...
Sort
View
JNW
2006
142views more  JNW 2006»
13 years 7 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
CDVE
2007
Springer
124views Visualization» more  CDVE 2007»
14 years 1 months ago
"Integrare", a Collaborative Environment for Behavior-Oriented Design
In order to build complex, large-scale, dependable systems it is necessary to use a development environment with an integrated set of capabilities that supports editing and formal...
Lian Wen, Robert Colvin, Kai Lin, John Seagrott, N...
EDBT
2009
ACM
218views Database» more  EDBT 2009»
14 years 2 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
SIGCOMM
2012
ACM
11 years 10 months ago
Network-aware service placement in a distributed cloud environment
We consider a system of compute and storage resources geographically distributed over a large number of locations connected via a wide-area network. By distributing the resources,...
Moritz Steiner, Bob Gaglianello Gaglianello, Vijay...
AEI
2004
132views more  AEI 2004»
13 years 7 months ago
An adaptive website system to improve efficiency with web mining techniques
The paper proposes an adaptive web system--that is, a website that is capable of changing its original design to fit user requirements. For the purpose of improving shortcomings o...
Ji-Hyun Lee, Wei-Kun Shiu