Sciweavers

4486 search results - page 820 / 898
» Cross-Evaluation: A new model for information system evaluat...
Sort
View
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
15 years 4 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
ICCS
2007
Springer
15 years 4 months ago
Dynamical Patterns in Scalefree Trees of Coupled 2D Chaotic Maps
New insights have been gained recently into the interplay between complex network architectures and the collective dynamics of simple elements coupled through them. The usual parad...
Zoran Levnajic, Bosiljka Tadic
DSONLINE
2006
79views more  DSONLINE 2006»
14 years 9 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
EUROSYS
2007
ACM
15 years 7 months ago
Exploiting nonstationarity for performance prediction
Real production applications ranging from enterprise applications to large e-commerce sites share a crucial but seldom-noted characteristic: The relative frequencies of transactio...
Christopher Stewart, Terence Kelly, Alex Zhang
ROBOCUP
2004
Springer
147views Robotics» more  ROBOCUP 2004»
15 years 3 months ago
Learning to Drive and Simulate Autonomous Mobile Robots
We show how to apply learning methods to two robotics problems, namely the optimization of the on-board controller of an omnidirectional robot, and the derivation of a model of the...
Alexander Gloye, Cüneyt Göktekin, Anna E...