Sciweavers

1008 search results - page 157 / 202
» Motivations for social networking at work
Sort
View
HPCA
2008
IEEE
16 years 6 days ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
15 years 6 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
AUTONOMICS
2008
ACM
15 years 1 months ago
Verification and semantic parallelization of goal-driven autonomous software
Future space missions such as the Mars Science Laboratory demand the engineering of some of the most complex manrated autonomous software systems. According to some recent estimat...
Damian Dechev, Nicolas Rouquette, Peter Pirkelbaue...
GISCIENCE
2008
Springer
123views GIS» more  GISCIENCE 2008»
15 years 27 days ago
A Theory of Change for Attributed Spatial Entities
Abstract. New methods of data collection, in particular the wide range of sensors and sensor networks that are being constructed, with the ability to collect real-time data streams...
John G. Stell, Michael F. Worboys
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 11 months ago
Attribute Exploration of Discrete Temporal Transitions
Discrete temporal transitions occur in a variety of domains, but this work is mainly motivated by applications in molecular biology: explaining and analyzing observed transcriptome...
Johannes Wollbold