Sciweavers

1760 search results - page 230 / 352
» The Focus of Requirements Engineering in Workflow Applicatio...
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 10 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
IPPS
2007
IEEE
15 years 4 months ago
A Study of Design Efficiency with a High-Level Language for FPGAs
Over the years reconfigurable computing devices such as FPGAs have evolved from gate-level glue logic to complex reprogrammable processing architectures. However, the tools used f...
Zain-ul-Abdin, Bertil Svensson
VAST
2004
ACM
15 years 3 months ago
Identifying technologies used in Cultural Heritage
There are a growing number of Information Communication Technology (ICT) applications in cultural heritage. However despite funding constraints, projects often involve similar or ...
Ruth Owen, Dimitrios Buhalis, Daniel Pletinckx
APWEB
2004
Springer
15 years 3 months ago
Graphical Representation of XML Schema
XML is becoming the de-facto standard for exchanging information in distributed applications and services. This has resulted in the development of a large number of XML documents w...
Flora Dilys Salim, Rosanne Price, Maria Indrawan, ...
GECCO
2004
Springer
103views Optimization» more  GECCO 2004»
15 years 3 months ago
Using a Genetic Algorithm to Design and Improve Storage Area Network Architectures
Abstract. Designing storage area networks is an NP-hard problem. Previous work has focused on traditional algorithmic techniques to automatically determine fabric requirements, net...
Elizabeth Dicke, Andrew Byde, Paul J. Layzell, Dav...