Sciweavers

147 search results - page 23 / 30
» Counting as integration in feasible analysis
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 9 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
EUROSPI
2008
Springer
13 years 9 months ago
Lightweight Process Documentation: Just Enough Structure in Automotive Pre-development
Pre-development in the automotive sector is informally organized to support the engineers trying out new ideas and generally being creative. If feasibility studies reveal system�...
Kai Stapel, Eric Knauss, Christian Allmann
OSDI
1996
ACM
13 years 8 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
EOR
2010
119views more  EOR 2010»
13 years 7 months ago
Adaptive Tabu Search for course timetabling
This paper presents an Adaptive Tabu Search algorithm (denoted by ATS) for solving a problem of curriculum-based course timetabling. The proposed algorithm follows a general frame...
Zhipeng Lü, Jin-Kao Hao
DKE
2007
162views more  DKE 2007»
13 years 7 months ago
A new algorithm for clustering search results
We develop a new algorithm for clustering search results. Differently from many other clustering systems that have been recently proposed as a post-processing step for Web search ...
Giansalvatore Mecca, Salvatore Raunich, Alessandro...