Sciweavers

1445 search results - page 170 / 289
» Architectures to make Simple Visualisations using Simple Sys...
Sort
View
TNC
2004
120views Education» more  TNC 2004»
15 years 3 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
117
Voted
ICS
2007
Tsinghua U.
15 years 8 months ago
Sensitivity analysis for automatic parallelization on multi-cores
Sensitivity Analysis (SA) is a novel compiler technique that complements, and integrates with, static automatic parallelization analysis for the cases when relevant program behavi...
Silvius Rus, Maikel Pennings, Lawrence Rauchwerger
DAIS
2010
15 years 4 months ago
Service Discovery in Ubiquitous Feedback Control Loops
Abstract. Nowadays, context-aware applications can discovery and interact with services in ubiquitous environments in order to customize their behavior. In general, these providers...
Daniel Romero 0002, Romain Rouvoy, Lionel Seinturi...
SBBD
2007
68views Database» more  SBBD 2007»
15 years 4 months ago
Querying Geographical Data Warehouses With GeoMDQL
Integrating geographical and multidimensional processing has been proposed in several researches in the database literature. One of the most important issues of this process is dat...
Joel da Silva, Ausberto S. Castro Vera, Anjolina G...
ECIS
2000
15 years 3 months ago
The Extensible Markup Language - New Opportunities in the Area of EDI
: Only about 5% of the companies which could profit from EDI actually use it. The main reason is that especially small and medium-sized enterprises (SMEs) try to avoid the consider...
Tim Weitzel, Frank Ladner, Peter Buxmann