Sciweavers

5970 search results - page 1097 / 1194
» Management Information Model Engineering
Sort
View
145
Voted
DASFAA
2009
IEEE
133views Database» more  DASFAA 2009»
15 years 10 months ago
Probabilistic Ranking in Uncertain Vector Spaces
Abstract. In many application domains, e.g. sensor databases, traffic management or recognition systems, objects have to be compared based on positionally and existentially uncert...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...
119
Voted
HICSS
2009
IEEE
114views Biometrics» more  HICSS 2009»
15 years 10 months ago
Reexamining Threat Rigidity: Implications for Design
Emergencies today seem larger, more complex, and unique than those of the past. Responding to them requires flexibility and creativity not easily achieved. The threat-rigidity the...
Linda Plotnick, Murray Turoff, Gerd Van Den Eede
140
Voted
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 10 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
168
Voted
JSSPP
2009
Springer
15 years 10 months ago
Decentralized Grid Scheduling with Evolutionary Fuzzy Systems
In this paper, we address the problem of finding workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end, we establish a n...
Alexander Fölling, Christian Grimme, Joachim ...
129
Voted
CNSR
2007
IEEE
122views Communications» more  CNSR 2007»
15 years 10 months ago
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology
Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smo...
Ebrahim Bagheri, Ali A. Ghorbani
« Prev « First page 1097 / 1194 Last » Next »