Sciweavers

504 search results - page 73 / 101
» Message Structures: a modelling technique for information sy...
Sort
View
SIGUCCS
2009
ACM
14 years 10 days ago
Frontline support at Princeton University: a centralized and decentralized approach
Frontline support and maintenance for desktop hardware and software systems at Princeton University has been uniquely structured, allowing the benefits of centralization and the f...
Maureen A. Novozinsky, Evelyne S. Roach, Leila M. ...
IAT
2007
IEEE
14 years 2 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
IJFCS
2006
106views more  IJFCS 2006»
13 years 7 months ago
A Timed Failure Equivalence Preserving Abstraction for Parametric Time-interval Automata
ion for Parametric Time-Interval Automata Akio Nakata, Tadaaki Tanimoto, Suguru Sasaki, Teruo Higashino Department of Information Networking, Graduate School of Information Science...
Akio Nakata, Tadaaki Tanimoto, Suguru Sasaki, Teru...
JCDL
2011
ACM
272views Education» more  JCDL 2011»
12 years 10 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
PROMISE
2010
13 years 2 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...