Sciweavers

15474 search results - page 2992 / 3095
» Emergent process design
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
DATE
2010
IEEE
193views Hardware» more  DATE 2010»
14 years 2 months ago
Coordinated resource optimization in behavioral synthesis
Abstract—Reducing resource usage is one of the most important optimization objectives in behavioral synthesis due to its direct impact on power, performance and cost. The datapat...
Jason Cong, Bin Liu, Junjuan Xu
HT
2010
ACM
14 years 2 months ago
Is this a good title?
Missing web pages, URIs that return the 404 “Page Not Found” error or the HTTP response code 200 but dereference unexpected content, are ubiquitous in today’s browsing exper...
Martin Klein, Jeffery L. Shipman, Michael L. Nelso...
JCDL
2010
ACM
199views Education» more  JCDL 2010»
14 years 2 months ago
Crowdsourcing the assembly of concept hierarchies
The“wisdom of crowds”is accomplishing tasks that are cumbersome for individuals yet cannot be fully automated by means of specialized computer algorithms. One such task is the...
Kai Eckert, Mathias Niepert, Christof Niemann, Cam...
ACSAC
2002
IEEE
14 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
« Prev « First page 2992 / 3095 Last » Next »