Sciweavers

3516 search results - page 665 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
IPPS
2006
IEEE
15 years 5 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
BPM
2006
Springer
166views Business» more  BPM 2006»
15 years 3 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
BMCBI
2008
116views more  BMCBI 2008»
14 years 12 months ago
Structuring an event ontology for disease outbreak detection
Background: This paper describes the design of an event ontology being developed for application in the machine understanding of infectious disease-related events reported in natu...
Ai Kawazoe, Hutchatai Chanlekha, Mika Shigematsu, ...
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
15 years 4 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
COSIT
1997
Springer
115views GIS» more  COSIT 1997»
15 years 4 months ago
Qualitative Representation of Change
Current geographic information systems (GISs) have been designed for querying and maintaining static databases representing static phenomena and give little support to those users ...
Kathleen Hornsby, Max J. Egenhofer