Sciweavers

1296 search results - page 143 / 260
» Multiplicative Background Risk
Sort
View
IJNSEC
2008
164views more  IJNSEC 2008»
15 years 21 days ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
CONCURRENCY
2007
118views more  CONCURRENCY 2007»
15 years 21 days ago
Design and implementation issues for distributed CCA framework interoperability
Component frameworks, including those that support the Common Component Architecture (CCA), represent a promising approach to addressing this challenge, one that is being realized...
Madhusudhan Govindaraju, Michael J. Lewis, Kenneth...
CORR
2007
Springer
89views Education» more  CORR 2007»
15 years 20 days ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
AC
2004
Springer
15 years 17 days ago
The Timeboxing process model for iterative software development
In today's business where speed is of essence, an iterative development approach that allows the functionality to be delivered in parts has become a necessity and an effectiv...
Pankaj Jalote, Aveejeet Palit, Priya Kurien
107
Voted
QRE
2008
140views more  QRE 2008»
15 years 5 days ago
Discrete mixtures of kernels for Kriging-based optimization
: Kriging-based exploration strategies often rely on a single Ordinary Kriging model which parametric covariance kernel is selected a priori or on the basis of an initial data set....
David Ginsbourger, Céline Helbert, Laurent ...