Sciweavers

473 search results - page 80 / 95
» Numerical Aspects in the Data Model of Conceptual Informatio...
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
CBRMD
2008
167views more  CBRMD 2008»
13 years 7 months ago
Case-based Reasoning for Diagnosis of Stress using Enhanced Cosine and Fuzzy Similarity
Intelligent analysis of heterogeneous data and information sources for efficient decision support presents an interesting yet challenging task in clinical environments. This is par...
Mobyen Uddin Ahmed, Shahina Begum, Peter Funk, Nin...
SAC
2002
ACM
13 years 7 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 7 months ago
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be eng...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin