Sciweavers

2784 search results - page 424 / 557
» Light analysis of complex systems
Sort
View
EUROSEC
2010
ACM
14 years 2 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
IRI
2003
IEEE
14 years 2 months ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
14 years 2 months ago
Runtime Power Monitoring in High-End Processors: Methodology and Empirical Data
With power dissipation becoming an increasingly vexing problem across many classes of computer systems, measuring power dissipation of real, running systems has become crucial for...
Canturk Isci, Margaret Martonosi
MOBIHOC
2003
ACM
14 years 2 months ago
Mobility modelling and trajectory prediction for cellular networks with mobile base stations
This paper provides mobility estimation and prediction for a variant of GSM network which resembles an adhoc wireless mobile network where base stations and users are both mobile....
Pubudu N. Pathirana, Andrey V. Savkin, Sanjay Jha
IEEEICCI
2002
IEEE
14 years 2 months ago
An Interaction-Based Approach for Structuring Coordination Activities
In this contribution we present a theoretical approach which has been utilized to inform the coordination of the development of complex systems. Coordination is regarded as a form...
Lars Taxén