Sciweavers

7009 search results - page 1302 / 1402
» Patterns in Complex Systems Modeling
Sort
View
ISI
2004
Springer
15 years 3 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
SCOPES
2004
Springer
15 years 3 months ago
Compact Procedural Implementation in DSP Software Synthesis Through Recursive Graph Decomposition
Abstract. Synthesis of digital signal processing (DSP) software from dataflow-based formal models is an effective approach for tackling the complexity of modern DSP applications. I...
Ming-Yung Ko, Praveen K. Murthy, Shuvra S. Bhattac...
HICSS
2003
IEEE
166views Biometrics» more  HICSS 2003»
15 years 3 months ago
Comparative Genome Annotation for Mapping, Prediction and Discovery of Genes
We have used comparative genome analyses to produce annotated maps for large genomic loci. The first example is a locus on mouse chromosome 9 that is syntenic to human chromosome ...
Claudia Kappen, J. Michael Salbaum
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 3 months ago
Automatic Mediation between Incompatible Component Interaction Styles
Incompatibility of component interaction styles is identified as a major obstacle to interoperability when using off-the-shelf components or dealing with legacy software in compos...
Klaus-Peter Löhr
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
« Prev « First page 1302 / 1402 Last » Next »