Sciweavers

2542 search results - page 136 / 509
» integration 2010
Sort
View
CSREASAM
2010
14 years 9 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
GLOBECOM
2010
IEEE
14 years 9 months ago
A Graphical Framework for Spectrum Modeling and Decision Making in Cognitive Radio Networks
There are many key problems of decision making related to spectrum occupancies in cognitive radio networks. It is known that there exist correlations of spectrum occupancies in tim...
Husheng Li, Robert C. Qiu
GRC
2010
IEEE
14 years 9 months ago
Genetic-Fuzzy Data Mining Techniques
This paper surveys some genetic-fuzzy data mining techniques for mining both membership functions and fuzzy association rules. The motivation from crisp mining to fuzzy mining wil...
Tzung-Pei Hong, Chun-Hao Chen, Vincent S. Tseng
ISAAC
2010
Springer
272views Algorithms» more  ISAAC 2010»
14 years 9 months ago
Neighbor Systems, Jump Systems, and Bisubmodular Polyhedra
The concept of neighbor system, introduced by Hartvigsen (2009), is a set of integral vectors satisfying a certain combinatorial property. In this paper, we reveal the relationship...
Akiyoshi Shioura
LDTA
2010
14 years 9 months ago
Using DSLs for developing enterprise systems
This paper investigates the suitability of contemporary DSL tools in the context of enterprise software development. The main focus is on integration issues between the DSL tool, ...
Margus Freudenthal