Sciweavers

22560 search results - page 4393 / 4512
» Development of Transportation Systems
Sort
View
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
EGOV
2003
Springer
14 years 2 months ago
Implementing e-Government in Spain
: New information and communication technologies within the Administration give rise to a series of important challenges: to select and use the various telematic and computer-relat...
José Luis Bermejo Latre
EUROCRYPT
2003
Springer
14 years 2 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
ICCS
2003
Springer
14 years 2 months ago
CORBA Based Real-Time Object-Group Platform in Distributed Computing Environments
Abstract. Recently, the distributed real-time services are developing in distributed object computing environments in a way that can support a new programming paradigm of the distr...
Su-Chong Joo, Sung-Kwun Oh, Chang-Sun Shin, Jun Hw...
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
14 years 2 months ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
« Prev « First page 4393 / 4512 Last » Next »