Sciweavers

3108 search results - page 514 / 622
» The Elements of Computer Credibility
Sort
View
ISI
2008
Springer
15 years 5 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
IJHPCA
2006
96views more  IJHPCA 2006»
15 years 5 months ago
On the User - Scheduler Dialogue: Studies of User-Provided Runtime Estimates and Utility Functions
Effective communication between user and scheduler is an important prerequisite to achieving a successful scheduling outcome from both parties' perspectives. In a grid or sta...
Cynthia Bailey Lee, Allan Snavely
JBI
2008
15 years 5 months ago
The Field Representation Language
The complexity of quantitative biomedical models, and the rate at which they are published, is increasing to a point where managing the information has become all but impossible w...
Guy Tsafnat
JCB
2008
170views more  JCB 2008»
15 years 5 months ago
Efficiently Identifying Max-Gap Clusters in Pairwise Genome Comparison
The spatial clustering of genes across different genomes has been used to study important problems in comparative genomics, from identification of operons to detection of homologo...
Xu Ling, Xin He, Dong Xin, Jiawei Han
CPHYSICS
2007
65views more  CPHYSICS 2007»
15 years 5 months ago
Plasma etching and feature evolution of organic low-k material by using VicAddress
Plasma process is a highly selective technique exploiting the individual or mixed function of positive ions, electrons, neutral radicals, and photons produced by low temperature p...
T. Makabe, T. Shimada, T. Yagisawa