Sciweavers

419 search results - page 44 / 84
» Three Case Studies of Large-Scale Data Flows
Sort
View
ISI
2006
Springer
13 years 7 months ago
On the Topology of the Dark Web of Terrorist Groups
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate propaganda, and recruit members. Studying the terrorist websites may help us understand ...
Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun ...
EPIA
2005
Springer
14 years 1 months ago
User Group Profile Modeling Based on User Transactional Data for Personalized Systems
In this paper, we propose a framework named UMT (User-profile Modeling based on Transactional data) for modeling user group profiles based on the transactional data. UMT is a gener...
Yiling Yang, Nuno C. Marques
IEEEARES
2006
IEEE
14 years 1 months ago
Availability Constraints for Avionic Data Buses
— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
Alban Gabillon, Laurent Gallon
JSA
2007
84views more  JSA 2007»
13 years 7 months ago
Optimizing data structures at the modeling level in embedded multimedia
Traditional design techniques for embedded systems apply transformations on the source code to optimize hardwarerelated cost factors. Unfortunately, such transformations cannot ad...
Marijn Temmerman, Edgar G. Daylight, Francky Catth...
ISPAN
2009
IEEE
14 years 2 months ago
High-Performance Cloud Computing: A View of Scientific Applications
— Scientific computing often requires the availability of a massive number of computers for performing large scale experiments. Traditionally, these needs have been addressed by ...
Christian Vecchiola, Suraj Pandey, Rajkumar Buyya