Sciweavers

1824 search results - page 254 / 365
» Practices and Techniques for Engineering Process Capability ...
Sort
View
124
Voted
VLDB
2007
ACM
166views Database» more  VLDB 2007»
15 years 9 months ago
To Share or Not To Share?
Intuitively, aggressive work sharing among concurrent queries in a database system should always improve performance by eliminating redundant computation or data accesses. We show...
Ryan Johnson, Nikos Hardavellas, Ippokratis Pandis...
131
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 3 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
148
Voted
IWCMC
2006
ACM
15 years 9 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
136
Voted
AICOM
2005
91views more  AICOM 2005»
15 years 3 months ago
Multiagent systems for cardiac pacing simulation and control
Abstract. Simulating and controlling physiological phenomena are complex tasks to tackle. This is due to the fact that physiological processes are usually described by a set of par...
Francesco Amigoni, Alessandro Beda, Nicola Gatti
IEEESCC
2007
IEEE
15 years 10 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung