Sciweavers

550 search results - page 51 / 110
» Supporting plan authoring and analysis
Sort
View
SAC
2010
ACM
14 years 2 months ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
NETWORK
2007
234views more  NETWORK 2007»
13 years 7 months ago
Surveillance Wireless Sensor Networks: Deployment Quality Analysis
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of depl...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
CSCW
2004
ACM
14 years 1 months ago
Field studies of computer system administrators: analysis of system management tools and practices
Computer system administrators are the unsung heroes of the information age, working behind the scenes to configure, maintain, and troubleshoot the computer infrastructure that un...
Rob Barrett, Eser Kandogan, Paul P. Maglio, Eben M...
CORR
2011
Springer
206views Education» more  CORR 2011»
12 years 11 months ago
Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks
Cellular networks are in a major transition from a carefully planned set of large tower-mounted basestations (BSs) to an irregular deployment of heterogeneous infrastructure eleme...
Harpreet S. Dhillon, Radha Krishna Ganti, Fran&cce...
GRID
2007
Springer
13 years 7 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...