Sciweavers

8658 search results - page 1477 / 1732
» Models of Command and Control
Sort
View
CHI
2010
ACM
15 years 11 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong
148
Voted
BIBE
2008
IEEE
137views Bioinformatics» more  BIBE 2008»
15 years 11 months ago
A sparse variational Bayesian approach for fMRI data analysis
— The aim of this work is to propose a new approach for the determination of the design matrix in fMRI experiments. The design matrix embodies all available knowledge about exper...
Vangelis P. Oikonomou, Evanthia E. Tripoliti, Dimi...
212
Voted
CCGRID
2008
IEEE
15 years 11 months ago
GridBatch: Cloud Computing for Large-Scale Data-Intensive Batch Applications
To be competitive, Enterprises are collecting and analyzing increasingly large amount of data in order to derive business insights. However, there are at least two challenges to m...
Huan Liu, Dan Orban
CEC
2008
IEEE
15 years 11 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ECRTS
2008
IEEE
15 years 11 months ago
Period and Deadline Selection for Schedulability in Real-Time Systems
Task period adaptations are often used to alleviate temporal overload conditions in real-time systems. Existing frameworks assume that only task periods are adjustable and that ta...
Thidapat Chantem, Xiaofeng Wang, Michael D. Lemmon...
« Prev « First page 1477 / 1732 Last » Next »