Sciweavers

8441 search results - page 1537 / 1689
» New Architectures for Vision
Sort
View
149
Voted
VIROLOGY
2010
162views more  VIROLOGY 2010»
15 years 3 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
VLSI
2010
Springer
15 years 3 months ago
Synchronous elasticization: Considerations for correct implementation and MiniMIPS case study
—Latency insensitivity is a promising design paradigm in the nanometer era since it has potential benefits of increased modularity and robustness to variations. Synchronous elas...
Eliyah Kilada, Shomit Das, Kenneth S. Stevens
124
Voted
AAAI
2010
15 years 2 months ago
Latent Class Models for Algorithm Portfolio Methods
Different solvers for computationally difficult problems such as satisfiability (SAT) perform best on different instances. Algorithm portfolios exploit this phenomenon by predicti...
Bryan Silverthorn, Risto Miikkulainen
BIS
2010
185views Business» more  BIS 2010»
15 years 2 months ago
From Economic Drivers to B2B Process Models: A Mapping from REA to UMM
Inter-organizational B2B systems are most likely tending to change their business requirements over time - e.g. establishing new partnerships or change existing ones. The problem i...
Rainer Schuster, Thomas Motal, Christian Huemer, H...
160
Voted
CASCON
2010
187views Education» more  CASCON 2010»
15 years 2 months ago
A Framework for Automatically Supporting End-Users in Service Composition
In Service Oriented Architecture (SOA), service composition integrates existing services to fulfill specific tasks using a set of standards and tools. However, current service comp...
Hua Xiao, Ying Zou, Ran Tang, Joanna Ng, Leho Nigu...
« Prev « First page 1537 / 1689 Last » Next »