Sciweavers

1477 search results - page 167 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
ICSE
2009
IEEE-ACM
13 years 7 months ago
A non-intrusive component-based approach for deploying unanticipated self-management behaviour
Supporting self-management behaviour by means of component-based architectural solutions has been the focus of many current research projects. In such a context, handling unantici...
Sandro Santos Andrade, Raimundo José de Ara...
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 4 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
DEBU
2008
125views more  DEBU 2008»
13 years 10 months ago
Querying XML in Timber
In this paper, we describe the TIMBER XML database system implemented at University of Michigan. TIMBER was one of the first native XML database systems, designed from the ground ...
Yuqing Wu, Stelios Paparizos, H. V. Jagadish
CODES
2004
IEEE
14 years 1 months ago
A loop accelerator for low power embedded VLIW processors
The high transistor density afforded by modern VLSI processes have enabled the design of embedded processors that use clustered execution units to deliver high levels of performan...
Binu K. Mathew, Al Davis
IM
2003
13 years 11 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...