Sciweavers

1205 search results - page 158 / 241
» From high-level component-based models to distributed implem...
Sort
View
PPPJ
2006
ACM
14 years 2 months ago
Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java developmen
The development of a tool for reconstructing UML sequence diagrams from executing Java programs is a challenging task. We implemented such a tool designed to analyze any kind of J...
Matthias Merdes, Dirk Dorsch
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 9 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
WACV
2007
IEEE
14 years 3 months ago
Motion Estimation Using a General Purpose Neural Network Simulator for Visual Attention
Motion detection and estimation is a first step in the much larger framework of attending to visual motion based on Selective Tuning Model of Visual Attention [1]. In order to be ...
Florentin Dorian Vintila, John K. Tsotsos
IAT
2003
IEEE
14 years 2 months ago
Discovery of Emergent Natural Laws by Hierarchical Multi-Agent Systems
This paper defines an approach to simulation of natural systems, inspired by complex systems theory. A complex natural system is modeled as a multi-agent simulation system, agents...
Henk Stolk, Kevin Gates, Jim Hanan
CONEXT
2008
ACM
13 years 10 months ago
Networking is IPC: a guiding principle to a better internet
This position paper outlines a new network architecture that is based on the fundamental principle that networking is interprocess communication (IPC). In this model, application ...
John Day, Ibrahim Matta, Karim Mattar