Sciweavers

983 search results - page 147 / 197
» Health Care Management
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 7 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
87
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
How to avoid drastic software process change (using stochastic stability)
Before performing drastic changes to a project, it is worthwhile to thoroughly explore the available options within the current structure of a project. An alternative to drastic c...
Tim Menzies, Steve Williams, Barry W. Boehm, Jairu...
ICPADS
2006
IEEE
15 years 6 months ago
Loop Scheduling with Complete Memory Latency Hiding on Multi-core Architecture
The widening gap between processor and memory performance is the main bottleneck for modern computer systems to achieve high processor utilization. In this paper, we propose a new...
Chun Xue, Zili Shao, Meilin Liu, Mei Kang Qiu, Edw...
127
Voted
ISCC
2006
IEEE
202views Communications» more  ISCC 2006»
15 years 6 months ago
Fuzzy Logic Congestion Control in TCP/IP Tandem Networks
Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Activ...
Chrysostomos Chrysostomou, Andreas Pitsillides
107
Voted
DOLAP
2004
ACM
15 years 6 months ago
Aggregate queries in peer-to-peer OLAP
A peer-to-peer (P2P) data management system consists essentially of a network of peer systems, each maintaining full autonomy over its own data resources. Data exchange between pe...
Mauricio Minuto Espil, Alejandro A. Vaisman