Sciweavers

5722 search results - page 1003 / 1145
» Security Function Interactions
Sort
View
113
Voted
MODELLIERUNG
2004
15 years 4 months ago
Modeling Socio-Technical Processes in e-Commerce Scenarios
: We consider socio-technical processes, i.e. processes where machines as well as humans participate. Typical examples occur in sales processes in e-commerce. Three modeling tasks ...
Michael M. Richter, Armin Stahl
141
Voted
UAI
2004
15 years 4 months ago
Bayesian Learning in Undirected Graphical Models: Approximate MCMC Algorithms
Bayesian learning in undirected graphical models--computing posterior distributions over parameters and predictive quantities-is exceptionally difficult. We conjecture that for ge...
Iain Murray, Zoubin Ghahramani
143
Voted
VISSYM
2004
15 years 4 months ago
Volume Visualization and Visual Queries for Large High-Dimensional Datasets
We propose a flexible approach for the visualization of large, high-dimensional datasets. The raw, highdimensional data is mapped into an abstract 3D distance space using the Fast...
Guido Reina, Thomas Ertl
MASCOTS
2003
15 years 4 months ago
Creating Realistic BGP Models
Modeling the Internet infrastructure is a challenging endeavor. Complex interactions between protocols, increasing traffic volumes and the irregular structure of the Internet lea...
Xenofontas A. Dimitropoulos, George F. Riley
MASCOTS
2003
15 years 4 months ago
NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services
Web Services are an emerging software technology that employ XML to share and exchange data. They may serve as wrappers for legacy data sources, integrate multiple remote data sou...
Shahram Ghandeharizadeh, Christos Papadopoulos, Pa...
« Prev « First page 1003 / 1145 Last » Next »