Sciweavers

2632 search results - page 363 / 527
» Management Issues in Eda
Sort
View
CCGRID
2006
IEEE
15 years 10 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
ICDE
2006
IEEE
134views Database» more  ICDE 2006»
15 years 10 months ago
Three Case Studies of Large-Scale Data Flows
We survey three examples of large-scale scientific workflows that we are working with at Cornell: the Arecibo sky survey, the CLEO high-energy particle physics experiment, and t...
William Y. Arms, Selcuk Aya, Manuel Calimlim, Jim ...
ICDE
2006
IEEE
192views Database» more  ICDE 2006»
15 years 10 months ago
Mining Executive Compensation Data from SEC Filings
In recent years, corporate governance has become a more and more important concern in investment decision-making. As one of the most important factors in evaluating corporate gove...
Chengmin Ding, Ping Chen
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 10 months ago
Detecting Link Spam Using Temporal Information
How to effectively protect against spam on search ranking results is an important issue for contemporary web search engines. This paper addresses the problem of combating one majo...
Guoyang Shen, Bin Gao, Tie-Yan Liu, Guang Feng, Sh...
IEEEARES
2006
IEEE
15 years 10 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger