Sciweavers

512 search results - page 80 / 103
» Method for User Oriented Modelling of Data Warehouse Systems
Sort
View
TOMS
1998
148views more  TOMS 1998»
14 years 9 months ago
PELLPACK: A Problem-Solving Environment for PDE-Based Applications on Multicomputer Platforms
This paper presents the software architecture and implementation of the problem solving environment (PSE) PELLPACK for modeling physical objects described by partial differential ...
Elias N. Houstis, John R. Rice, Sanjiva Weerawaran...
PIMRC
2008
IEEE
15 years 4 months ago
Base-station and subcarrier assignment in two-cell OFDMA downlink under QoS fairness
Abstract— Consider the problem of base-station and subcarrier assignment on the downlink of a two-cell OFDMA system with adaptive modulation. The aim is to maximize a common data...
Ayman Alsawah, Inbar Fijalkow
SADFE
2008
IEEE
15 years 4 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
ICMCS
2006
IEEE
179views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Optimizing Algorithms for Region-of-Interest Video Compression, with Application to Mobile Telehealth
Wireless communication of video poses constraints on information capacity. Region-of-Interest (ROI) video coding provides higher quality in the ROI, but poorer quality in the back...
Sira Rao, Nikil Jayant
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 9 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh