Sciweavers

218 search results - page 25 / 44
» Risk Assessment in Complex Interacting Infrastructure System...
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 4 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CLADE
2003
IEEE
14 years 27 days ago
vGrid: A Framework For Building Autonomic Applications
With rapid technological advances in network infrastructure, programming languages, compatible component interfaces and so many more areas, today the computational Grid has evolve...
Bithika Khargharia, Salim Hariri, Manish Parashar,...
WSPI
2004
13 years 9 months ago
Grounding Knowledge of Engineering Applications in Systematic Terms
In the main research of internet-computing enabled knowledge management, we use some of the most advanced research scenarios, arguing that we critically need a system approach to q...
Ying Liu 0002, Jin Yu
BMCBI
2004
174views more  BMCBI 2004»
13 years 7 months ago
Implications for domain fusion protein-protein interactions based on structural information
Background: Several in silico methods exist that were developed to predict protein interactions from the copious amount of genomic and proteomic data. One of these methods is Doma...
Jer-Ming Chia, Prasanna R. Kolatkar
IUI
2006
ACM
14 years 1 months ago
Eye-tracking to model and adapt to user meta-cognition in intelligent learning environments
In this paper we describe research on using eye-tracking data for on-line assessment of user meta-cognitive behavior during the interaction with an intelligent learning environmen...
Christina Merten, Cristina Conati