Sciweavers

3639 search results - page 574 / 728
» Provenance as Dependency Analysis
Sort
View
111
Voted
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 6 months ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh
IEEEAMS
2003
IEEE
15 years 6 months ago
JAGR: An Autonomous Self-Recovering Application Server
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to r...
George Candea, Emre Kiciman, Steve Zhang, Pedram K...
89
Voted
INFOCOM
2003
IEEE
15 years 6 months ago
Understanding TCP fairness over Wireless LAN
— As local area wireless networks based on the IEEE 802.11 standard see increasing public deployment, it is important to ensure that access to the network by different users rema...
Saar Pilosof, Ramachandran Ramjee, Danny Raz, Yuva...
129
Voted
ISCA
2003
IEEE
93views Hardware» more  ISCA 2003»
15 years 6 months ago
Improving Dynamic Cluster Assignment for Clustered Trace Cache Processors
This work examines dynamic cluster assignment for a clustered trace cache processor (CTCP). Previously proposed cluster assignment techniques run into unique problems as issue wid...
Ravi Bhargava, Lizy Kurian John
80
Voted
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
15 years 6 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...