Sciweavers

5215 search results - page 977 / 1043
» Modeling User Interfaces to Workflow Information Systems
Sort
View
139
Voted
TIT
2008
110views more  TIT 2008»
15 years 3 months ago
Optimal Cross-Layer Scheduling of Transmissions Over a Fading Multiaccess Channel
We consider the problem of several users transmitting packets to a base station, and study an optimal scheduling formulation involving three communication layers, namely, the mediu...
Munish Goyal, Anurag Kumar, Vinod Sharma
107
Voted
JSW
2007
116views more  JSW 2007»
15 years 3 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
179
Voted
SAC
2008
ACM
15 years 3 months ago
Towards automatic feature vector optimization for multimedia applications
We systematically evaluate a recently proposed method for unsupervised discrimination power analysis for feature selection and optimization in multimedia applications. A series of...
Tobias Schreck, Dieter W. Fellner, Daniel A. Keim
118
Voted
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 8 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
126
Voted
POLICY
2007
Springer
15 years 10 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell