Sciweavers

2337 search results - page 386 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ISCA
2007
IEEE
192views Hardware» more  ISCA 2007»
14 years 2 months ago
Analysis of redundancy and application balance in the SPEC CPU2006 benchmark suite
The recently released SPEC CPU2006 benchmark suite is expected to be used by computer designers and computer architecture researchers for pre-silicon early design analysis. Partia...
Aashish Phansalkar, Ajay Joshi, Lizy Kurian John
ECTEL
2007
Springer
14 years 1 months ago
ALOE - A Socially Aware Learning Resource and Metadata Hub
The changing nature of e-Learning, the Web, and its users that can be observed in the last years results in a need for new approaches and technologies to fully exploit the existing...
Martin Memmel, Rafael Schirru
BMCBI
2007
112views more  BMCBI 2007»
13 years 7 months ago
Integrated olfactory receptor and microarray gene expression databases
Background: Gene expression patterns of olfactory receptors (ORs) are an important component of the signal encoding mechanism in the olfactory system since they determine the inte...
Nian Liu, Chiquito J. Crasto, Minghong Ma
EDBT
2009
ACM
218views Database» more  EDBT 2009»
14 years 2 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
ICDCN
2010
Springer
14 years 2 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee