Sciweavers

305 search results - page 36 / 61
» A model for quantitative evaluation of an end-to-end questio...
Sort
View
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 3 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
IPPS
2005
IEEE
14 years 2 months ago
Measuring Scalability of Resource Management Systems
Scalability refers to the extent of configuration modifications over which a system continues to be economically deployable. Until now, scalability of resource management system...
Arindam Mitra, Muthucumaru Maheswaran, Shoukat Ali
SKG
2006
IEEE
14 years 2 months ago
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate ...
Jinjun Chen, Yun Yang
PROMISE
2010
13 years 3 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...

Publication
200views
12 years 7 months ago
Tracking Endocardial Motion via Multiple Model Filtering of Distribution Cut
Tracking heart motion plays an essential role in the diagnosis of cardiovascular diseases. As such, accurate characterization of dynamic behavior of the left ventricle (LV) is esse...
Kumaradevan Punithakumar, Ismail Ben Ayed, Ali Isl...