Sciweavers

3686 search results - page 114 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
COMCOM
2002
143views more  COMCOM 2002»
13 years 10 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
GW
1999
Springer
116views Biometrics» more  GW 1999»
14 years 2 months ago
Temporal Symbolic Integration Applied to a Multimodal System Using Gestures and Speech
Abstract. This paper presents a technical approach for temporal symbol integration aimed to be generally applicable in unimodal and multimodal user interfaces. It draws its strengt...
Timo Sowa, Martin Fröhlich, Marc Erich Latosc...
IJSEKE
2007
52views more  IJSEKE 2007»
13 years 10 months ago
Software Architecture Decomposition Using Attributes
Software architectural design has an enormous effect on downstream software artifacts. Decomposition of functions for the final system is one of the critical steps in software arch...
Chung-Horng Lung, Xia Xu, Marzia Zaman
NOMS
2000
IEEE
144views Communications» more  NOMS 2000»
14 years 2 months ago
Managing application services over service provider networks: architecture and dependency analysis
This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors’ experience with the IBM Global Network. It describes how one can e...
Gautam Kar, Alexander Keller, Seraphin B. Calo
IJVR
2008
119views more  IJVR 2008»
13 years 10 months ago
Narrating Built Heritage by Its Own Storytelling
This paper intends to demonstrate the importance of a Linguistic approach for understanding the complexity implied in the simulations of the Built Environment. Indeed, it will be a...
Ruggero Lancia