Sciweavers

902 search results - page 126 / 181
» Opening Address
Sort
View
EOR
2007
221views more  EOR 2007»
13 years 8 months ago
Application of the analytical hierarchy process to establish health care waste management systems that minimise infection risks
This paper focuses on the application of the analytical hierarchy process (AHP) technique in the context of sustainable development to establish and optimise health care waste man...
Alan C. Brent, David E. C. Rogers, Tsaletseng S. M...
JAIR
2007
146views more  JAIR 2007»
13 years 8 months ago
Semantic Matchmaking as Non-Monotonic Reasoning: A Description Logic Approach
Matchmaking arises when supply and demand meet in an electronic marketplace, or when agents search for a web service to perform some task, or even when recruiting agencies match c...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
JSA
2007
139views more  JSA 2007»
13 years 8 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
CLUSTER
2004
IEEE
13 years 8 months ago
DyRAM: An Active Reliable Multicast Framework for Data Distribution
Group communications (multicast) are foreseen to be one of the most critical yet challenging technologies to meet the exponentially growing demands for data distribution in a large...
Moufida Maimour, CongDuc Pham
COMCOM
2004
79views more  COMCOM 2004»
13 years 8 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...