Sciweavers

6312 search results - page 1025 / 1263
» A design framework for metaheuristics
Sort
View
69
Voted
DSN
2005
IEEE
15 years 6 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
113
Voted
ESCIENCE
2005
IEEE
15 years 6 months ago
On the Costs for Reliable Messaging in Web/Grid Service Environments
As Web Services have matured they have been substantially leveraged within the academic, research and business communities. An exemplar of this is the realignment, last year, of t...
Shrideep Pallickara, Geoffrey Fox, Beytullah Yildi...
HICSS
2005
IEEE
139views Biometrics» more  HICSS 2005»
15 years 6 months ago
Complex Decision Making Processes: their Modelling and Support
Decision making processes and systems to support the same have focused for the most part on narrow disciplines, paradigms, perspectives, and pre-determined processes. Apart from t...
Angela Liew, David Sundaram
108
Voted
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 6 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
HICSS
2005
IEEE
159views Biometrics» more  HICSS 2005»
15 years 6 months ago
A User Controlled Approach to Adjustable Autonomy
This paper describes a framework for collaboration between a user and a multi-agent system to achieve adjustable autonomy. Adjustable autonomy (AA) is when the levels of autonomy ...
Nancy E. Reed
« Prev « First page 1025 / 1263 Last » Next »