Sciweavers

720 search results - page 102 / 144
» Linear k-arboricities on trees
Sort
View
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 3 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
WEBI
2004
Springer
14 years 3 months ago
Using Semantic Graphs in Clustering Process : Enhance Information Level
In this paper, we particularly focused our attention on how to enhance expressivity of ontologies when used as organized space values in a catalogue request process. Using the Wis...
Jean-Sébastien Brunner, Isabelle Berrien
GLVLSI
2003
IEEE
239views VLSI» more  GLVLSI 2003»
14 years 3 months ago
A novel 32-bit scalable multiplier architecture
In this paper, we present a novel hybrid multiplier architecture that has the regularity of linear array multipliers and the performance of tree multipliers and is highly scalable...
Yeshwant Kolla, Yong-Bin Kim, John Carter
METRICS
2003
IEEE
14 years 3 months ago
When Can We Test Less?
When it is impractical to rigorously assess all parts of complex systems, test engineers use defect detectors to focus their limited resources. In this article, we define some pr...
Tim Menzies, Justin S. Di Stefano, Kareem Ammar, K...
ICN
2001
Springer
14 years 2 months ago
Multicast Routing and Wavelength Assignment in Multi-Hop Optical Networks
This paper addresses multicast routing in multi-hop optical networks employing wavelength-division multiplexing (WDM). We consider a model in which multicast communication requests...
Ran Libeskind-Hadas, Rami G. Melhem