Sciweavers

2421 search results - page 416 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
DSS
2000
102views more  DSS 2000»
13 years 9 months ago
Cost control and production performance enhancement by IT investment and regulation changes: evidence from the healthcare indust
By using panel data spanning a period of 18 years and by estimating a general cost function in a cost minimization Z .setting, we conducted an analysis of information technology I...
Nirup M. Menon, Byungtae Lee
DSN
2009
IEEE
13 years 7 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
CP
2011
Springer
12 years 9 months ago
Algorithm Selection and Scheduling
Algorithm portfolios aim to increase the robustness of our ability to solve problems efficiently. While recently proposed algorithm selection methods come ever closer to identifyin...
Serdar Kadioglu, Yuri Malitsky, Ashish Sabharwal, ...
CGI
2006
IEEE
14 years 4 months ago
MIP-Guided Vascular Image Visualization with Multi-Dimensional Transfer Function
Direct volume rendering (DVR) is an effective way to visualize 3D vascular images for diagnosis of different vascular pathologies and planning of surgical treatments. Angiograms ar...
Ming-Yuen Chan, Yingcai Wu, Huamin Qu, Albert C. S...
ISPA
2005
Springer
14 years 3 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...