Sciweavers

6229 search results - page 1220 / 1246
» Models of Computation for Networks on Chip
Sort
View
KDD
2009
ACM
379views Data Mining» more  KDD 2009»
14 years 1 months ago
MetaFac: community discovery via relational hypergraph factorization
This paper aims at discovering community structure in rich media social networks, through analysis of time-varying, multi-relational data. Community structure represents the laten...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
IWDC
2001
Springer
140views Communications» more  IWDC 2001»
14 years 1 months ago
Satellite Systems Performance with TCP-IP Applications
Mobile Internet access is becoming extremely popular because users depend on the Internet for many activities in their daily routine. Satellites are well suited for mobile Interne...
Pierpaolo Loreti, Michele Luglio, Rohit Kapoor, J....
PFE
2001
Springer
14 years 1 months ago
Easing the Transition to Software Mass Customization
Although software mass customization offers the potential for order-of-magnitude improvements in software engineering performance, the up-front cost, level of effort, assumed risk,...
Charles W. Krueger
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ATAL
2004
Springer
14 years 16 days ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
« Prev « First page 1220 / 1246 Last » Next »