Sciweavers

1938 search results - page 224 / 388
» Dependable Software
Sort
View
SERP
2004
13 years 10 months ago
The Architectural Design of FRUIT: A Family of Retargetable User Interface Tools
Forms-based user interfaces are widely used means for human-computer interaction. However, it is difficult to exploit software reuse in forms-based systems because the systems ten...
Yi Liu, H. Conrad Cunningham, Hui Xiong
IWAN
2000
Springer
14 years 23 days ago
Differentiated Quality of Service in Application Layer Active Networks
A novel approach to quality of service control in an active service network (application layer active network) is described. The approach makes use of a distributed genetic algori...
Chris M. Roadknight, Ian W. Marshall
SICHERHEIT
2010
13 years 7 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius
ICIP
2001
IEEE
14 years 10 months ago
Adaptive algorithms for variable-complexity video coding
Variable-complexity algorithms provide a means of managing the computational complexity of a software video CODEC. The reduction in computational complexity provided by existing v...
Iain E. Garden Richardson, Yafan Zhao
DMIN
2006
105views Data Mining» more  DMIN 2006»
13 years 10 months ago
Structural Analysis and Destabilizing Terrorist Networks
This paper proposed structural analysis and mathematical methods for destabilizing terrorist networks. The three different approaches are discussed for example: (i) cohesion analys...
Nasrullah Memon, Henrik Legind Larsen