Sciweavers

2874 search results - page 518 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 4 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
SASO
2007
IEEE
14 years 4 months ago
Desynchronization: The Theory of Self-Organizing Algorithms for Round-Robin Scheduling
The study of synchronization has received much attention in a variety of applications, ranging from coordinating sensors in wireless networks to models of fireflies flashing in...
Ankit Patel, Julius Degesys, Radhika Nagpal
QSIC
2007
IEEE
14 years 4 months ago
Automatic Quality Assessment of SRS Text by Means of a Decision-Tree-Based Text Classifier
The success of a software project is largely dependent upon the quality of the Software Requirements Specification (SRS) document, which serves as a medium to communicate user req...
Ishrar Hussain, Olga Ormandjieva, Leila Kosseim
ICN
2007
Springer
14 years 4 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
30
Voted
CSMR
2006
IEEE
14 years 4 months ago
IntensiVE, a toolsuite for documenting and checking structural source-code regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens