Sciweavers

5494 search results - page 1081 / 1099
» E-services Management Requirements
Sort
View
117
Voted
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 12 days ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ECR
2007
116views more  ECR 2007»
15 years 11 days ago
Enabling assisted strategic negotiations in actual-world procurement scenarios
In the everyday business world, the sourcing process of multiple goods and services usually involves complex negotiations (via telephone, fax, etc) that include discussion of prod...
Jesús Cerquides, Maite López-S&aacut...
113
Voted
MICRO
2008
IEEE
162views Hardware» more  MICRO 2008»
15 years 11 days ago
MetaTM/TxLinux: Transactional Memory for an Operating System
This paper quantifies the effect of architectural design decisions on the performance of TxLinux. TxLinux is a Linux kernel modified to use transactions in place of locking primit...
Hany E. Ramadan, Christopher J. Rossbach, Donald E...
JUCS
2006
95views more  JUCS 2006»
15 years 11 days ago
POCA : A User Distributions Algorithm in Enterprise Systems with Clustering
Abstract: As enterprises worldwide race to improve real-time management to improve productivity, customer services and flexibility, huge resources have been invested into enterpris...
Ping-Yu Hsu, Ping-Ho Ting
NAR
2008
175views more  NAR 2008»
15 years 11 days ago
Onto-CC: a web server for identifying Gene Ontology conceptual clusters
The Gene Ontology (GO) vocabulary has been extensively explored to analyze the functions of coexpressed genes. However, despite its extended use in Biology and Medical Sciences, t...
Rocío Romero-Záliz, Coral del Val, J...
« Prev « First page 1081 / 1099 Last » Next »