Sciweavers

8468 search results - page 1435 / 1694
» The Technology of Data Stashing
Sort
View
VLDB
2001
ACM
100views Database» more  VLDB 2001»
15 years 3 months ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
WAIM
2001
Springer
15 years 3 months ago
Three-Tier Clustering: An Online Citation Clustering System
In this paper, we present an online citation entry clustering system based on three-tier clustering. The objective is to further process search results returned by bibliography dat...
Haifeng Jiang, Wenwu Lou, Wei Wang 0011
ACSAC
2000
IEEE
15 years 3 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
89
Voted
CGI
2000
IEEE
15 years 3 months ago
Simulated Patient for Orthognathic Surgery
Orthognathic surgery corrects a wide range of minor and major facial and jaw irregularities. This surgery will improve the patients’ ability to chew, speak and breathe. In many ...
Horace Ho-Shing Ip, Christy S. B. Kot, James Xia
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 3 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
« Prev « First page 1435 / 1694 Last » Next »