Sciweavers

6312 search results - page 1017 / 1263
» A design framework for metaheuristics
Sort
View
89
Voted
ACSAC
2006
IEEE
15 years 6 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
110
Voted
CBMS
2006
IEEE
15 years 6 months ago
Machine Learning Techniques to Enable Closed-Loop Control in Anesthesia
The growing availability of high throughput measurement devices in the operating room makes possible the collection of a huge amount of data about the state of the patient and the...
Olivier Caelen, Gianluca Bontempi, Eddy Coussaert,...
110
Voted
CLUSTER
2006
IEEE
15 years 6 months ago
Kernel-Level Measurement for Integrated Parallel Performance Views: the KTAU Project
The effect of the operating system on application performance is an increasingly important consideration in high performance computing. OS kernel measurement is key to understandi...
Aroon Nataraj, Allen D. Malony, Sameer Shende, Ala...
112
Voted
CODES
2006
IEEE
15 years 6 months ago
Key technologies for the next generation wireless communications
The principal objectives of next generation wireless communication are the delivery of higher data rate services including video, audio, data and voice signals with worldwide comp...
Kyung-Ho Kim
82
Voted
DATE
2006
IEEE
82views Hardware» more  DATE 2006»
15 years 6 months ago
Performance analysis of greedy shapers in real-time systems
— Traffic shaping is a well-known technique in the area of networking and is proven to reduce global buffer requirements and end-to-end delays in networked systems. Due to these...
Ernesto Wandeler, Alexander Maxiaguine, Lothar Thi...
« Prev « First page 1017 / 1263 Last » Next »