Sciweavers

9640 search results - page 1702 / 1928
» Information Systems Development as an Activity
Sort
View
DEXA
1997
Springer
179views Database» more  DEXA 1997»
14 years 1 days ago
Linking Object-Oriented Conceptual Modeling with Object-Oriented Implementation in Java
Nowadays, if we want to obtain a sound and correct final software product it is very important to be able to properly join modern OO programming environments, which are built for ...
Oscar Pastor, Emilio Insfrán, Vicente Pelec...
SIGCOMM
1991
ACM
13 years 12 months ago
A Control-Theoretic Approach to Flow Control
This paper presents a control-theoretic approach to reactive flow control in networks that do not reserve bandwidth. We assume a round-robin-like queue service discipline in the o...
Srinivasan Keshav
USS
2008
13 years 10 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
USS
2008
13 years 10 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
WSC
2007
13 years 10 months ago
Visualization techniques utilizing the sensitivity analysis of models
Models of real world systems are being increasingly generated from data that describes the behaviour of systems. Data mining techniques, such as Artificial Neural Networks (ANN),...
Ivo Kondapaneni, Pavel Kordík, Pavel Slav&i...
« Prev « First page 1702 / 1928 Last » Next »