Sciweavers

17552 search results - page 3480 / 3511
» Signal-regulated systems and networks
Sort
View
CHIMIT
2007
ACM
13 years 11 months ago
Network-centricity: hindered by hierarchical anchors
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...
Steve Abrams, Gloria Mark
CLUSTER
2007
IEEE
13 years 11 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
DOCENG
2007
ACM
13 years 11 months ago
A document engineering environment for clinical guidelines
In this paper, we present a document engineering environment for Clinical Guidelines (G-DEE), which are standardized medical documents developed to improve the quality of medical ...
Gersende Georg, Marie-Christine Jaulent
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
EXPCS
2007
13 years 11 months ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...
« Prev « First page 3480 / 3511 Last » Next »