Sciweavers

431 search results - page 65 / 87
» Failure or Success
Sort
View
119
Voted
ISSA
2004
15 years 4 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
102
Voted
FTCS
1998
83views more  FTCS 1998»
15 years 4 months ago
The SunSCALR Framework for Internet Servers
Internet servers need to be highly-available, inexpensive, and scalable. These goals are often con icting and most designs meet, with limited success, only few of them. In this pa...
Ashish Singhai, Swee Boon Lim, Sanjay R. Radia
AAAI
1997
15 years 4 months ago
Using a Robot Control Architecture to Automate Space Shuttle Operations
This paper describes preliminary results from using an AI robot control software architecture, known as 3T, as the software framework for a procedure tracking system for the space...
R. Peter Bonasso, David Kortenkamp, Troy Whitney
134
Voted
FMICS
2010
Springer
15 years 4 months ago
SMT-Based Formal Verification of a TTEthernet Synchronization Function
Abstract. TTEthernet is a communication infrastructure for mixedcriticality systems that integrates dataflow from applications with different criticality levels on a single network...
Wilfried Steiner, Bruno Dutertre
150
Voted
FSKD
2008
Springer
174views Fuzzy Logic» more  FSKD 2008»
15 years 4 months ago
A Hybrid Re-sampling Method for SVM Learning from Imbalanced Data Sets
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the pr...
Peng Li, Pei-Li Qiao, Yuan-Chao Liu