Sciweavers

2978 search results - page 177 / 596
» Operations Research
Sort
View
135
Voted
IEEEARES
2009
IEEE
15 years 10 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
IPPS
2009
IEEE
15 years 10 months ago
Minimizing total busy time in parallel scheduling with application to optical networks
—We consider a scheduling problem in which a bounded number of jobs can be processed simultaneously by a single machine. The input is a set of n jobs J = {J1, . . . , Jn}. Each j...
Michele Flammini, Gianpiero Monaco, Luca Moscardel...
131
Voted
HICSS
2005
IEEE
143views Biometrics» more  HICSS 2005»
15 years 9 months ago
Evaluating PACS Success: A Multidimensional Model
A picture archiving and communications system (PACS) is an integrated workflow system for managing images and related data which is designed to streamline operations throughout th...
Guy Paré, David Aubry, Luigi Lepanto, Claud...
159
Voted
MATES
2005
Springer
15 years 9 months ago
CASCOM: Context-Aware Service Co-ordination in Mobile P2P Environments
Abstract. The research project CASCOM (Context-aware Business Application Service Co-ordination in Mobile Computing Environments) will implement, validate, and trial value-added su...
Heikki Helin, Matthias Klusch, António Lope...
112
Voted
SRDS
2003
IEEE
15 years 9 months ago
Assessing the Dependability of OGSA Middleware by Fault Injection
This paper presents our research on devising a dependability assessment method for the upcoming OGSA 3.0 middleware using network level fault injection. We compare existing DCE mi...
Nik Looker, Jie Xu