Sciweavers

117 search results - page 11 / 24
» Robust Resource Allocation in Weather Data Processing System...
Sort
View
TR
2008
98views more  TR 2008»
13 years 7 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
ICIS
1998
13 years 8 months ago
An activity based costing approach to systems development and implementation
Many organizations are in the process of replacing legacy systems with large, integrated systems using new technological platforms. Accurate estimation of project resources requir...
Ginny Ooi, Christina Soh, Pui Mun Lee
INFFUS
2007
107views more  INFFUS 2007»
13 years 7 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
ECBS
2006
IEEE
126views Hardware» more  ECBS 2006»
14 years 1 months ago
Experiments and Investigations for the Personal High Performance Computing (PHPC) built on top of the 64-bit processing and clus
The motivation and objective for this paper is to demonstrate “Personal High Performance Computing (PHPC)”, which requires only a smaller number of computers, resources and sp...
Victor Chang
CIKM
2006
Springer
13 years 11 months ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger