Sciweavers

2863 search results - page 481 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
151
Voted
DKE
2002
218views more  DKE 2002»
15 years 2 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
84
Voted
DSN
2005
IEEE
15 years 8 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ISOLA
2010
Springer
15 years 19 days ago
Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins
In the Taverna workflow design and enactment tool, users often find it difficult to both manually discover a service or workflow fragment that executes a desired operation on a pie...
David Withers, Edward A. Kawas, E. Luke McCarthy, ...
134
Voted
ITCC
2005
IEEE
15 years 8 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
126
Voted
IJMI
2008
97views more  IJMI 2008»
15 years 2 months ago
Positive effects of electronic patient records on three clinical activities
Purpose: To investigate the effects of a fully functional electronic patient record (EPR) system on clinicians' work during team conferences, ward rounds, and nursing handove...
Morten Hertzum, Jesper Simonsen