Sciweavers

6819 search results - page 1237 / 1364
» Process Reuse Architecture
Sort
View
ISCAPDCS
2003
15 years 5 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
WIS
2004
15 years 5 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
PDPTA
2003
15 years 5 months ago
Dependability Prediction of High Availability OSCAR Cluster Server
High availability (HA) computing has recently gained much attention, especially in enterprise and mission critical systems. The HA is now a necessity that is no longer regarded as...
Chokchai Leangsuksun, Lixin Shen, Tong Liu, Herton...
SDM
2003
SIAM
148views Data Mining» more  SDM 2003»
15 years 5 months ago
ATLaS: A Native Extension of SQL for Data Mining
A lack of power and extensibility in their query languages has seriously limited the generality of DBMSs and hampered their ability to support data mining applications. Thus, ther...
Haixun Wang, Carlo Zaniolo
CASCON
1997
98views Education» more  CASCON 1997»
15 years 5 months ago
Similarity-based retrieval for diverse bookshelf software repository users
The paper presents a similarity-based retrieval framework for a software repository that aids the process of maintaining, understanding, and migrating legacy software systems [12]...
Igor Jurisica
« Prev « First page 1237 / 1364 Last » Next »