Sciweavers

2093 search results - page 358 / 419
» Developing Federation Object Models Using Ontologies
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 10 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
VIIP
2001
13 years 10 months ago
Collision Handling and Shadow Casting in Virtual-Prismaker
Abstract. Our research team is developing a computer construction game called VirtualPrismaker based on the physical game Prismakertm . We have had to deal with all typical and ess...
Víctor López-Jaquero, Antonio Fern&a...
NETWORK
2010
122views more  NETWORK 2010»
13 years 3 months ago
Betweenness centrality and resistance distance in communication networks
In this article we report on applications and extensions of weighted graph theory in the design and control of communication networks. We model the communication network as a weig...
Ali Tizghadam, Alberto Leon-Garcia
PROFES
2004
Springer
14 years 2 months ago
Intelligent Support for Software Release Planning
One of the most prominent issues involved in incremental software development is to decide upon the most appropriate software release plans taking into account all explicit and imp...
Amandeep, Günther Ruhe, Mark Stanford
CSSE
2008
IEEE
14 years 3 months ago
Rapid Acquirement and Visualization of CityGML Documents
—With the development of the Internet, the need of city 3D data is rising more and more, and the emphasis shifts from analysis to the sharing of city 3D data and information over...
Lingli Zhao, Shuai Liu, Junsheng Li, Haicheng Xu