Sciweavers

1041 search results - page 164 / 209
» Biomedical Case Studies in Data Intensive Computing
Sort
View
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
ACMICEC
2008
ACM
276views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
A Bayesian network for IT governance performance prediction
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...
Mårten Simonsson, Robert Lagerström, Po...
CIDR
2007
165views Algorithms» more  CIDR 2007»
13 years 9 months ago
A Black-Box Approach to Query Cardinality Estimation
We present a “black-box” approach to estimating query cardinality that has no knowledge of query execution plans and data distribution, yet provides accurate estimates. It doe...
Tanu Malik, Randal C. Burns, Nitesh V. Chawla
FGCS
2006
119views more  FGCS 2006»
13 years 7 months ago
OpenMP versus MPI for PDE solvers based on regular sparse numerical operators
Tw o parallel programming models represented b y OpenMP and MPI are compared for PDE solvers based on regular sparse numerical operators. As a typical representative of such an app...
Markus Nordén, Sverker Holmgren, Michael Th...
TCAD
2008
103views more  TCAD 2008»
13 years 7 months ago
Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems
Latency-insensitive protocols allow system-on-chip (SoC) engineers to decouple the design of the computing cores from the design of the intercore communication channels while follo...
Rebecca L. Collins, Luca P. Carloni