Sciweavers

1585 search results - page 296 / 317
» Data Quality Requirements Analysis and Modeling
Sort
View
116
Voted
EMSOFT
2007
Springer
15 years 9 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
149
Voted
IAT
2007
IEEE
15 years 10 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
113
Voted
AIED
2007
Springer
15 years 9 months ago
How did the e-learning session go? The Student Inspector
Good teachers know their students, and exploit this knowledge to adapt or optimise their instruction. Traditional teachers know their students because they interact with them face-...
Oliver Scheuer, Claus Zinn
SCIA
2007
Springer
154views Image Analysis» more  SCIA 2007»
15 years 9 months ago
3D Deformable Registration for Monitoring Radiotherapy Treatment in Prostate Cancer
Two deformable registration methods, the Demons and the Morphon algorithms, have been used for registration of CT datasets to evaluate their usability in radiotherapy planning for ...
Borja Rodríguez-Vila, Johanna Pettersson, M...
135
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...