Sciweavers

1424 search results - page 186 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
CHI
2008
ACM
16 years 1 months ago
Asynchronous remote medical consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Rowena Luk, Melissa Ho, Paul M. Aoki
DAC
2006
ACM
16 years 2 months ago
Fast analysis of structured power grid by triangularization based structure preserving model order reduction
In this paper, a Triangularization Based Structure preserving (TBS) model order reduction is proposed to verify power integrity of on-chip structured power grid. The power grid is...
Hao Yu, Yiyu Shi, Lei He
ICPP
2007
IEEE
15 years 7 months ago
A Meta-Learning Failure Predictor for Blue Gene/L Systems
The demand for more computational power in science and engineering has spurred the design and deployment of ever-growing cluster systems. Even though the individual components use...
Prashasta Gujrati, Yawei Li, Zhiling Lan, Rajeev T...
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
15 years 6 months ago
Developing Analytic, Cognitive and Linguistic Skills with an Electronic Negotiation System
An increasing number of Web-based systems, including brainstorming, decision-making, and negotiation support systems, are being developed to aid users in solving particular types ...
Margaret J. Kersten, Marlene Haley, Gregory E. Ker...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 5 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo