Sciweavers

1261 search results - page 251 / 253
» Extending the Capabilities of Component Models for Embedded ...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 1 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
IPPS
1999
IEEE
14 years 3 hour ago
Process Networks as a High-Level Notation for Metacomputing
Abstract. Our work involves the development of a prototype Geographical Information System GIS as an example of the use of process networks as a well-de ned high-level semantic mod...
Darren Webb, Andrew L. Wendelborn, Kevin Maciunas
JSAC
2010
138views more  JSAC 2010»
13 years 6 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
SIGMOD
1996
ACM
133views Database» more  SIGMOD 1996»
13 years 12 months ago
Multi-dimensional Resource Scheduling for Parallel Queries
Scheduling query execution plans is an important component of query optimization in parallel database systems. The problem is particularly complex in a shared-nothing execution en...
Minos N. Garofalakis, Yannis E. Ioannidis
ICEB
2004
234views Business» more  ICEB 2004»
13 years 9 months ago
A Component-based Framework for Distributed Business Simulations in E-Business Environments
Simulations preserve the knowledge of complex dynamic systems and consequently transfer the knowledge of the cohesions of its elements to a specified target group. As the progress...
Alexander Hampel, Edward Bernroider