Sciweavers

2904 search results - page 469 / 581
» Analysis Experiences Using Information Visualization
Sort
View
112
Voted
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 6 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
113
Voted
PODS
1989
ACM
155views Database» more  PODS 1989»
15 years 6 months ago
Fractals for Secondary Key Retrieval
In this paper we propose the use of fractals and especially the Hilbert curve, in order to design good distance-preserving mappings. Such mappings improve the performance of secon...
Christos Faloutsos, Shari Roseman
WSC
2007
15 years 4 months ago
Simulation of passenger check-in at a medium-sized US airport
Delays in the check-in system at an airport vary with times of the day, day of the week, and types of check-in modes chosen by the passengers. Extensive data collection of the che...
Simone Appelt, Rajan Batta, Li Lin, Colin G. Drury
AMI
2008
Springer
15 years 4 months ago
An Ambient Agent Model Exploiting Workflow-Based Reasoning to Recognize Task Progress
For an ambient intelligent agent to support a human in demanding tasks it is important to be aware of the progress made in a given workflow. It would be possible to interact with t...
Fiemke Both, Mark Hoogendoorn, Jan Treur
CATA
2004
15 years 3 months ago
Annotating Linguistic Data with ImageSpace for the Preservation of Endangered Languages
Many languages are in serious danger of being lost and as a result, there has been a significant increase in language documentation projects, and also in attempts to preserve lang...
Shiyong Lu, Rong Huang, Farshad Fotouhi