Sciweavers

480 search results - page 95 / 96
» An Analysis of the XOR Dynamic Problem Generator Based on th...
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 1 days ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ASMTA
2008
Springer
167views Mathematics» more  ASMTA 2008»
13 years 7 months ago
Perfect Simulation of Stochastic Automata Networks
The solution of continuous and discrete-time Markovian models is still challenging mainly when we model large complex systems, for example, to obtain performance indexes of paralle...
Paulo Fernandes, Jean-Marc Vincent, Thais Webber
SDM
2004
SIAM
211views Data Mining» more  SDM 2004»
13 years 6 months ago
Using Support Vector Machines for Classifying Large Sets of Multi-Represented Objects
Databases are a key technology for molecular biology which is a very data intensive discipline. Since molecular biological databases are rather heterogeneous, unification and data...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...
SIMULATION
2010
150views more  SIMULATION 2010»
13 years 5 days ago
Profiling Literature in Healthcare Simulation
: The publications that relate to the application of simulation to healthcare have steadily increased over the years. These publications are scattered amongst various journals that...
Navonil Mustafee, Korina Katsaliaki, Simon J. E. T...
DIMVA
2010
13 years 6 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...