Sciweavers

1654 search results - page 231 / 331
» Comparing Two Software Design Process Theories
Sort
View
JSAC
2006
111views more  JSAC 2006»
15 years 4 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JIKM
2007
103views more  JIKM 2007»
15 years 4 months ago
Education for sustainability: Creating Skills in Human Capital Analysis
This paper presents the role of an innovative university masters’ degree program as a basis for skills development in human capital analysis for finance and business students in...
Carol Royal, Loretta O'Donnell
ICDT
2012
ACM
226views Database» more  ICDT 2012»
13 years 7 months ago
Factorised representations of query results: size bounds and readability
We introduce a representation system for relational data based on algebraic factorisation using distributivity of product over union and commutativity of product and union. We giv...
Dan Olteanu, Jakub Zavodny
TKDE
2011
150views more  TKDE 2011»
14 years 11 months ago
Estimating and Enhancing Real-Time Data Service Delays: Control-Theoretic Approaches
—It is essential to process real-time data service requests such as stock quotes and trade transactions in a timely manner using fresh data, which represent the current real worl...
Kyoung-Don Kang, Yan Zhou, Jisu Oh
ISCAPDCS
2007
15 years 6 months ago
Architectural requirements of parallel computational biology applications with explicit instruction level parallelism
—The tremendous growth in the information culture, efficient digital searches are needed to extract and identify information from huge data. The notion that evolution in silicon ...
Naeem Zafar Azeemi