Sciweavers

18094 search results - page 3539 / 3619
» The Architecture of Secure Systems
Sort
View
CORR
2004
Springer
208views Education» more  CORR 2004»
14 years 11 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
JCNS
2002
99views more  JCNS 2002»
14 years 11 months ago
Coarse-Grained Reduction and Analysis of a Network Model of Cortical Response: I. Drifting Grating Stimuli
We present a reduction of a large-scale network model of visual cortex developed by McLaughlin, Shapley, Shelley, and Wielaard. The reduction is from many integrate-and-fire neuron...
Michael Shelley, David McLaughlin
JUCS
2002
231views more  JUCS 2002»
14 years 11 months ago
Efficient Content-Based and Metadata Retrieval in Image Database
: Managing image data in a database system using metadata has been practiced since the last two decades. However, describing an image fully and adequately with metadata is practica...
Solomon Atnafu, Richard Chbeir, Lionel Brunie
SIGMETRICS
2002
ACM
14 years 11 months ago
Full-system timing-first simulation
Computer system designers often evaluate future design alternatives with detailed simulators that strive for functional fidelity (to execute relevant workloads) and performance fi...
Carl J. Mauer, Mark D. Hill, David A. Wood
TCS
2002
14 years 11 months ago
Process algebra for performance evaluation
This paper surveys the theoretical developments in the field of stochastic process algebras, process algebras where action occurrences may be subject to a delay that is determined...
Holger Hermanns, Ulrich Herzog, Joost-Pieter Katoe...
« Prev « First page 3539 / 3619 Last » Next »