Sciweavers

1012 search results - page 136 / 203
» Identification of System Software Components Using Clusterin...
Sort
View
ACMSE
2005
ACM
14 years 2 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ARCS
2005
Springer
14 years 2 months ago
Reusable Design of Inter-chip Communication Interfaces for Next Generation of Adaptive Computing Systems
Abstract. The SoC (System-on-Chip) technology is used in small and flexible consumer electronic devices. SoCs include one or more microcontroller, memory, programmable logic, and ...
Vincent Kotzsch, Jörg Schneider, Günther...
BMCBI
2008
147views more  BMCBI 2008»
13 years 9 months ago
Simple integrative preprocessing preserves what is shared in data sources
Background: Bioinformatics data analysis toolbox needs general-purpose, fast and easily interpretable preprocessing tools that perform data integration during exploratory data ana...
Abhishek Tripathi, Arto Klami, Samuel Kaski
JUCS
2000
102views more  JUCS 2000»
13 years 9 months ago
Towards Two-Level Formal Modeling of Computer-Based Systems
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
Gabor Karsai, Greg Nordstrom, Ákos Lé...
PROMS
2001
Springer
109views Multimedia» more  PROMS 2001»
14 years 1 months ago
Model-Based Service Creation in the Friends Project
—This paper presents a model-based approach to service creation. We observe that the complexity of software services increases. To manage this complexity, and to quickly create s...
Wouter B. Teeuw, Dick A. C. Quartel