Sciweavers

1585 search results - page 208 / 317
» Data Quality Requirements Analysis and Modeling
Sort
View
IDA
2009
Springer
15 years 2 months ago
Hierarchical Extraction of Independent Subspaces of Unknown Dimensions
Abstract. Independent Subspace Analysis (ISA) is an extension of Independent Component Analysis (ICA) that aims to linearly transform a random vector such as to render groups of it...
Peter Gruber, Harold W. Gutch, Fabian J. Theis
LCN
2000
IEEE
15 years 9 months ago
On Integrating Differentiated Services and UMTS Networks
Differentiated Services (DS) is currently the major approach discussed to provide network layer service differentiation in IP networks. However, the discussion mainly addresses ...
Jörg Diederich, Thorsten Lohmar, Martina Zitt...
FASE
2009
Springer
15 years 11 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
ISBI
2007
IEEE
15 years 11 months ago
Noise and Artifact Removal in Knife-Edge Scanning Microscopy
Knife-Edge Scanning Microscopy (KESM) is a recently developed technique that allows fast and automated imaging of several hundred cubic millimeters of tissue at sub-micron resolut...
David Mayerich, Bruce H. McCormick, John Keyser
WOSP
2005
ACM
15 years 10 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...