Sciweavers

1477 search results - page 157 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 10 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
IASTEDSEA
2004
13 years 11 months ago
A software reliability model for web services
This paper proposes a service-oriented software reliability model that dynamically evaluates the reliability of Web services. There are two kinds of Web services: atomic services ...
Wei-Tek Tsai, Dawei Zhang, Yinong Chen, Hai Huang,...
VLDB
2002
ACM
126views Database» more  VLDB 2002»
13 years 9 months ago
FAS - A Freshness-Sensitive Coordination Middleware for a Cluster of OLAP Components
Data warehouses offer a compromise between freshness of data and query evaluation times. However, a fixed preference ratio between these two variables is too undifferentiated. Wit...
Uwe Röhm, Klemens Böhm, Hans-Jörg S...
ACSC
2002
IEEE
14 years 3 months ago
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation
Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current...
Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham
SIGMOD
2006
ACM
122views Database» more  SIGMOD 2006»
14 years 10 months ago
MonetDB/XQuery: a fast XQuery processor powered by a relational engine
Relational XQuery systems try to re-use mature relational data management infrastructures to create fast and scalable XML database technology. This paper describes the main featur...
Peter A. Boncz, Torsten Grust, Maurice van Keulen,...