Sciweavers

5722 search results - page 1102 / 1145
» Security Function Interactions
Sort
View
ACSC
2006
IEEE
14 years 4 months ago
Modelling layer 2 and layer 3 device bandwidths using B-node theory
Modern computer networks contain an amalgamation of devices and technologies, with the performance exhibited by each central to digital communications. Varieties of methods exist ...
S. Cikara, Stanislaw P. Maj, David T. Shaw
ICDE
2006
IEEE
124views Database» more  ICDE 2006»
14 years 4 months ago
Systematic Approach for Optimizing Complex Mining Tasks on Multiple Databases
It has been well recognized that data mining is an interactive and iterative process. In order to support this process, one of the long-term goals of data mining research has been...
Ruoming Jin, Gagan Agrawal
IV
2006
IEEE
113views Visualization» more  IV 2006»
14 years 3 months ago
Output Media Adapted Cartographic Visualisation
In modern cartography of the late twentieth century, the Internet offers an ideal platform for the communication via maps. The map graphics pose as an essential part of the graphi...
Alexandra Stadler, Mirjanka Lechthaler
PARELEC
2006
IEEE
14 years 3 months ago
MPI and Non-MPI Simulations for Epitaxial Surface Growth
Usually, theories of surface growth are based on the study of global processes without taking in account the local behaviour of atoms. We have implemented two Montecarlo simulation...
Carmen B. Navarrete, Susana Holgado, Eloy Anguiano
IUI
2006
ACM
14 years 3 months ago
Who's asking for help?: a Bayesian approach to intelligent assistance
Automated software customization is drawing increasing attention as a means to help users deal with the scope, complexity, potential intrusiveness, and ever-changing nature of mod...
Bowen Hui, Craig Boutilier
« Prev « First page 1102 / 1145 Last » Next »