Sciweavers

14824 search results - page 2875 / 2965
» Security - Introduction
Sort
View
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 4 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
87
Voted
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 4 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
79
Voted
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
15 years 4 months ago
Efficacy and Sustainability of a Telerehabilitation Program
Efficacy and Sustainability of a Telerehabilitation Program Sustainability and appropriateness of care are important components for healthcare systems as they begin integrating te...
Cynthia Scheideman-Miller, Pamela G. Clark, Al Moo...
HOTOS
2003
IEEE
15 years 4 months ago
Palimpsest: Soft-Capacity Storage for Planetary-Scale Services
Distributed writable storage systems typically provide NFS-like semantics and unbounded persistence for files. We claim that for planetary-scale distributed services such facilit...
Timothy Roscoe, Steven Hand
ICDAR
2003
IEEE
15 years 4 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
« Prev « First page 2875 / 2965 Last » Next »