Sciweavers

9588 search results - page 1724 / 1918
» Service Value Networks
Sort
View
127
Voted
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 4 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
142
Voted
DGO
2009
111views Education» more  DGO 2009»
15 years 4 months ago
"Integrated" and "transcendent" e-government: keys for analyzing organizational structure and governance
As e-government enters the "transformation" phase, public authorities face major challenges in terms of governance and leadership. The present article consolidates prior...
Beat Estermann, Reinhard Riedl, Alessia C. Neuroni
158
Voted
GECON
2008
Springer
152views Business» more  GECON 2008»
15 years 4 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
123
Voted
ECAI
2010
Springer
15 years 4 months ago
Mining Outliers with Adaptive Cutoff Update and Space Utilization (RACAS)
Recently the efficiency of an outlier detection algorithm ORCA was improved by RCS (Randomization with faster Cutoff update and Space utilization after pruning), which changes the ...
Chi-Cheong Szeto, Edward Hung
144
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
Energy Efficient Estimation of Gaussian Sources over Inhomogeneous Gaussian MAC Channels
In this paper, we first provide a joint source and channel coding (JSCC) approach in estimating Gaussian sources over Gaussian MAC channels, as well as its sufficient and necessary...
Shuangqing Wei, Rajgopal Kannan, S. Sitharama Iyen...
« Prev « First page 1724 / 1918 Last » Next »