Sciweavers

1989 search results - page 171 / 398
» A framework for testing database applications
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 8 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ER
2008
Springer
91views Database» more  ER 2008»
13 years 10 months ago
Location-Based Software Modeling and Analysis: Tropos-Based Approach
The continuous growth of interest in mobile applications makes the concept of location essential to design and develop software systems. Location-based software is supposed to be a...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
DEXAW
2004
IEEE
190views Database» more  DEXAW 2004»
13 years 12 months ago
Enabling Distribution and Reuse of Ontology Mapping Information for Semantically Enriched Communication Services
In the past, many attempts have been made to improve the interoperability between different Web-based information systems. In most approaches the remaining problems are still twof...
Eva Gahleitner, Wolfram Wöß
DATE
2007
IEEE
55views Hardware» more  DATE 2007»
14 years 2 months ago
Sensitivity analysis for fault-analysis and tolerance in RF front-end circuitry
RFIC reliability is fast becoming a major bottleneck in the yield and performance of modern IC systems, as process complexity and levels of integration continually increase. Due t...
Tejasvi Das, P. R. Mukund
ICMCS
2005
IEEE
105views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Personalizing Quality Aspects in Scalable Video Coding
In video coding, certain limitations imposed by the environment, most typically the bit rate, need to be fulfilled. This is achieved by allowing the encoder to reduce the quality ...
Sam Lerouge, Robbie De Sutter, Rik Van de Walle