Sciweavers

4207 search results - page 670 / 842
» Stable Analysis Patterns
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Converge-cast with MIMO
—This paper investigates throughput and delay based on a newly predominant traffic pattern, called converge-cast, where each of the n nodes in the network act as a destination w...
Luoyi Fu, Yi Qin, Xinbing Wang, Xue Liu
JAMIA
2011
83views more  JAMIA 2011»
12 years 11 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
CCS
2011
ACM
12 years 8 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
CIKM
2011
Springer
12 years 8 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
ICDE
2012
IEEE
203views Database» more  ICDE 2012»
11 years 11 months ago
Parameter-Free Determination of Distance Thresholds for Metric Distance Constraints
—The importance of introducing distance constraints to data dependencies, such as differential dependencies (DDs) [28], has recently been recognized. The metric distance constrai...
Shaoxu Song, Lei Chen 0002, Hong Cheng