Sciweavers

10396 search results - page 1932 / 2080
» Deployment Support Network
Sort
View
ISSA
2004
15 years 3 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
ECIS
2003
15 years 3 months ago
A multi-model algorithm for the cost-oriented design of the information technology infrastructure
Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Danilo Ardagna, Chiara Francalanci, Marco Trubian
100
Voted
MASCOTS
2004
15 years 3 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
ICWN
2003
15 years 3 months ago
Adapting Content for Mobile Devices in Heterogeneous Collaboration Environments
The portability of new miniaturized devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Recent advances ...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox
IJCAI
2003
15 years 3 months ago
A New Look at the Semantics and Optimization Methods of CP-Networks
Preference elicitation is a serious bottleneck in many decision support applications and agent specification tasks. CP-nets were designed to make the preference elicitation proces...
Ronen I. Brafman, Yannis Dimopoulos
« Prev « First page 1932 / 2080 Last » Next »