Sciweavers

1737 search results - page 136 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
148
Voted
ESWA
2011
220views Database» more  ESWA 2011»
14 years 6 months ago
Unsupervised neural models for country and political risk analysis
This interdisciplinary research project focuses on relevant applications of Knowledge Discovery and Artificial Neural Networks in order to identify and analyse levels of country, b...
Álvaro Herrero, Emilio Corchado, Alfredo Ji...
152
Voted
COOPIS
2004
IEEE
15 years 6 months ago
SPREE: Object Prefetching for Mobile Computers
Mobile platforms combined with large databases promise new opportunities for mobile applications. However, mobile computing devices may experience frequent communication loss while...
Kristian Kvilekval, Ambuj K. Singh
147
Voted
CCGRID
2003
IEEE
15 years 8 months ago
Using grid technologies to face medical image analysis challenges
The availability of digital imagers inside hospitals and their ever growing inspection capabilities have established digital medical images as a key component of many pathologies ...
Johan Montagnat, Vincent Breton, Isabelle E. Magni...
140
Voted
HEURISTICS
2002
99views more  HEURISTICS 2002»
15 years 2 months ago
Parallelizing Tabu Search on a Cluster of Heterogeneous Workstations
In this paper, we present the parallelization of tabu search on a network of workstations using PVM. Two parallelization strategies are integrated: functional decomposition strate...
Ahmad A. Al-Yamani, Sadiq M. Sait, Habib Youssef, ...
131
Voted
INTERACT
2007
15 years 4 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...