Sciweavers

2784 search results - page 344 / 557
» Light analysis of complex systems
Sort
View
IWNAS
2008
IEEE
15 years 11 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
HICSS
2006
IEEE
135views Biometrics» more  HICSS 2006»
15 years 10 months ago
Optimizing an IT Project Portfolio with Time-Wise Interdependencies
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
15 years 10 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
SIGMOD
2010
ACM
176views Database» more  SIGMOD 2010»
15 years 9 months ago
DCUBE: discrimination discovery in databases
Discrimination discovery in databases consists in finding unfair practices against minorities which are hidden in a dataset of historical decisions. The DCUBE system implements t...
Salvatore Ruggieri, Dino Pedreschi, Franco Turini
ISOLA
2010
Springer
15 years 2 months ago
A Linked Data Approach to Sharing Workflows and Workflow Results
A bioinformatics analysis pipeline is often highly elaborate, due to the inherent complexity of biological systems and the variety and size of laboratory publications would be high...
Marco Roos, Sean Bechhofer, Jun Zhao, Paolo Missie...