Sciweavers

1718 search results - page 165 / 344
» Modeling and testing of cloud applications
Sort
View
ISMIS
2005
Springer
15 years 9 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 9 months ago
Applying the Task-Technology Fit Model to WWW-based Procurement: Conceptualization and Measurement
This research examines the application of the tasktechnology fit (TTF) model to World Wide Web (WWW) usage for electronic commerce (EC) purposes. Conducted from corporate buyersâ€...
Younes Benslimane, Michel Plaisent, Prosper Bernar...
ISLPED
1999
ACM
236views Hardware» more  ISLPED 1999»
15 years 8 months ago
Modeling and automating selection of guarding techniques for datapath elements
While guarded evaluation has proven an effective energy saving technique in arithmetic circuits, good methodologies do not exist for determining when and how to guard for maximal ...
William E. Dougherty, Donald E. Thomas
LREC
2008
93views Education» more  LREC 2008»
15 years 5 months ago
Using a Probabilistic Model of Context to Detect Word Obfuscation
This paper proposes a distributional model of word use and word meaning which is derived purely from a body of text, and then applies this model to determine whether certain words...
Sanaz Jabbari, Ben Allison, Louise Guthrie
IMECS
2007
15 years 5 months ago
A Model to Describe the Relationships Man - Machine - Maintenance - Economy (MMME)
— In the globalisation spirit, one of the major objectives of companies is how to reduce the production losses cost-effectively for continuously enhancement of competitiveness an...
Basim Al-Najjar, Daniel Andersson, Martin Jacobsso...