Sciweavers

7160 search results - page 1211 / 1432
» Organizing Multiagent Systems
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
IV
2008
IEEE
119views Visualization» more  IV 2008»
15 years 11 months ago
CAT: A Hierarchical Image Browser Using a Rectangle Packing Technique
The recent revolution of digital camera technology has resulted in much larger collections of images. Image browsing techniques thus become increasingly important for overview and...
Ai Gomi, Reiko Miyazaki, Takayuki Itoh, Jia Li
115
Voted
TRIDENTCOM
2008
IEEE
15 years 11 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
VL
2008
IEEE
151views Visual Languages» more  VL 2008»
15 years 11 months ago
Codetrail: Connecting source code and web resources
When faced with the need for documentation, examples, bug fixes, error descriptions, code snippets, workarounds, templates, patterns, or advice, software developers frequently tu...
Max Goldman, Robert C. Miller
ACRI
2008
Springer
15 years 11 months ago
Automatic Design of FPGA Processor for the Backtracking of DNA Sequences Evolution Using Cellular Automata and Genetic Algorithm
In several cases, the DNA sequences of an organism are available in different stages of its evolution and it is desirable to reconstruct the DNA sequence in a previous evolution st...
Georgios Ch. Sirakoulis
« Prev « First page 1211 / 1432 Last » Next »