Sciweavers

3193 search results - page 601 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ISMIR
2004
Springer
130views Music» more  ISMIR 2004»
14 years 1 months ago
Towards Automatic Identification Of Singing Language In Popular Music Recordings
The automatic analysis of singing from music is an important and challenging issue within the research target of content-based retrieval of music information. As part of this rese...
Wei-Ho Tsai, Hsin-Min Wang
CSE
2009
IEEE
13 years 11 months ago
Energy Consumption of Residential and Professional Switches
Abstract—Precise evaluation of network appliance energy consumption is necessary to accurately model or simulate the power consumption of distributed systems. In this paper we ev...
Helmut Hlavacs, Georges Da Costa, Jean-Marc Pierso...
QUESTA
2007
50views more  QUESTA 2007»
13 years 7 months ago
Stability of join-the-shortest-queue networks
This paper investigates stability behavior in a variant of a generalized Jackson queueing network. In our network, some customers use a join-the-shortest-queue policy when enterin...
J. G. Dai, John J. Hasenbein, Bara Kim
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 5 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
TII
2010
124views Education» more  TII 2010»
13 years 2 months ago
Address-Independent Estimation of the Worst-case Memory Performance
Abstract--Real-time systems are subject to temporal constraints and require a schedulability analysis to ensure that task execution finishes within lower and upper specified bounds...
Basilio B. Fraguela, Diego Andrade, Ramon Doallo