Sciweavers

875 search results - page 82 / 175
» Representing distributed systems using the Open Provenance M...
Sort
View
ECAI
2010
Springer
14 years 11 months ago
Bayesian Monte Carlo for the Global Optimization of Expensive Functions
In the last decades enormous advances have been made possible for modelling complex (physical) systems by mathematical equations and computer algorithms. To deal with very long run...
Perry Groot, Adriana Birlutiu, Tom Heskes
CCGRID
2010
IEEE
14 years 11 months ago
An Effective Architecture for Automated Appliance Management System Applying Ontology-Based Cloud Discovery
Cloud computing is a computing paradigm which allows access of computing elements and storages on-demand over the Internet. Virtual Appliances, pre-configured, readyto-run applicat...
Amir Vahid Dastjerdi, Sayed Gholam Hassan Tabataba...
PROMISE
2010
14 years 4 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
DATE
2000
IEEE
121views Hardware» more  DATE 2000»
15 years 2 months ago
Composite Signal Flow: A Computational Model Combining Events, Sampled Streams, and Vectors
The composite signal flow model of computation targets systems with significant control and data processing parts. It builds on the data flow and synchronous data flow models ...
Axel Jantsch, Per Bjuréus
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin