Sciweavers

2874 search results - page 502 / 575
» Intrusion Detection: Systems and Models
Sort
View
IAJIT
2010
133views more  IAJIT 2010»
13 years 8 months ago
Mediation Queries Adaptation After the Removal of a Data Source
: A broad variety of data is available in distinct heterogeneous sources, stored under different formats: database formats (in relational and object-oriented models), document form...
Latifa Baba-hamed
WCRE
2010
IEEE
13 years 8 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
CDC
2010
IEEE
146views Control Systems» more  CDC 2010»
13 years 5 months ago
Adaptive autonomous soaring of multiple UAVs using Simultaneous Perturbation Stochastic Approximation
Abstract-- This paper presents a new algorithm for maximizing the flight duration of a single UAV (Uninhabited Air Vehicle) and UAVs group using the thermal model developed by Alle...
Cathrine Antal, Oleg Granichin, Sergey Levi
KBSE
2007
IEEE
14 years 4 months ago
Direct-dependency-based software compatibility testing
Software compatibility testing is an important quality assurance task aimed at ensuring that component-based software systems build and/or execute properly across a broad range of...
Il-Chul Yoon, Alan Sussman, Atif M. Memon, Adam A....
CASES
2008
ACM
14 years 5 hour ago
Multi-granularity sampling for simulating concurrent heterogeneous applications
Detailed or cycle-accurate/bit-accurate (CABA) simulation is a critical phase in the design flow of embedded systems. However, with increasing system complexity, full detailed sim...
Melhem Tawk, Khaled Z. Ibrahim, Smaïl Niar