Sciweavers

1033 search results - page 149 / 207
» Properties of Exercise Strategies
Sort
View
ICSOC
2007
Springer
15 years 10 months ago
Automated Dynamic Maintenance of Composite Services Based on Service Reputation
Abstract. Service-oriented computing promotes the construction of applications by composing distributed services that are advertised in an open service market. In such an environme...
Domenico Bianculli, Radu Jurca, Walter Binder, Car...
PAKDD
2007
ACM
121views Data Mining» more  PAKDD 2007»
15 years 10 months ago
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model
When companies seek for the combination of products which can constantly generate high profit, the association rule mining (ARM) or the utility mining will not achieve such task. ...
Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang
SAFECOMP
2007
Springer
15 years 10 months ago
Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System
A strategy and relating activities of a software safety analysis (SSA) are presented for the software of a digital reactor protection system where software modules in the design de...
Gee-Yong Park, Jang-Soo Lee, Se Woo Cheon, Kee-Cho...
GLOBECOM
2006
IEEE
15 years 10 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
VTC
2006
IEEE
124views Communications» more  VTC 2006»
15 years 10 months ago
Linear Dispersion for Single-Carrier Communications in Frequency Selective Channels
Abstract— Linear dispersion coded orthogonal frequency division multiplexing (LDC-OFDM) has recently been proposed to improve joint frequency and time diversity. This paper inves...
Jinsong Wu, Steven D. Blostein