Sciweavers

328 search results - page 44 / 66
» Are You Being Served
Sort
View
NIPS
2008
13 years 10 months ago
Learning with Consistency between Inductive Functions and Kernels
Regularized Least Squares (RLS) algorithms have the ability to avoid over-fitting problems and to express solutions as kernel expansions. However, we observe that the current RLS ...
Haixuan Yang, Irwin King, Michael R. Lyu
AISM
2004
13 years 10 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
AOIS
2003
13 years 10 months ago
Trustworthy Service Caching: Cooperative Search in P2P Information Systems
We are developing an approach for P2P information systems, where the peers are modeled as autonomous agents. Agents provide services or give referrals to one another to help find...
Yathiraj B. Udupi, Pinar Yolum, Munindar P. Singh
ISTA
2004
13 years 10 months ago
Applying Web Service Compositions in Systems Management
: Systems management in any organization depends exclusively on the efforts of a system administrator. Every change in the IT infrastructure landscape requires changes in the syste...
Dimka Karastoyanova
ERSA
2003
147views Hardware» more  ERSA 2003»
13 years 10 months ago
Towards Run-Time Re-Configurable Techniques for Real-Time Embedded Applications
Many embedded applications can benefit from the flexible custom computing opportunities that FPGA technology offers. The Run-Time Reconfiguration (RTR) of the FPGA as an applicati...
Timothy F. Oliver, Douglas L. Maskell