Sciweavers

1863 search results - page 64 / 373
» Load-Reuse Analysis: Design and Evaluation
Sort
View
JMLR
2010
162views more  JMLR 2010»
14 years 4 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...
DIMEA
2008
176views Multimedia» more  DIMEA 2008»
14 years 11 months ago
Designing GUI for the user configuration of pervasive awareness applications
The vision of Pervasive and Ubiquitous Computing promises that our future environments will be furnished with an increasing number of computationally augmented artifacts. Conseque...
Eleni Romoudi, Theodosia Fokidou
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 10 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
SOCIALCOM
2010
14 years 7 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
ICUMT
2009
14 years 7 months ago
On the architecture and the design of P2P live streaming system schedulers
-- In this paper we analyze P2P live streaming systems. Through this analysis we obtain the crucial parameters for their performance in terms of bandwidth utilization, set-up time,...
Athanasios Christakidis, Nikolaos Efthymiopoulos, ...