Sciweavers

238 search results - page 36 / 48
» Modification analysis support at the requirements level
Sort
View
PET
2010
Springer
13 years 11 months ago
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
Abstract. Low-latency anonymous communication networks require padding to resist timing analysis attacks, and dependent link padding has been proven to prevent these attacks with m...
Claudia Díaz, Steven J. Murdoch, Carmela Tr...
BIOSTEC
2008
162views Healthcare» more  BIOSTEC 2008»
13 years 9 months ago
On Extraction of Nutritional Patterns (NPS) Using Fuzzy Association Rule Mining
This paper proposes a framework for mining market basket data to generate Nutritional Patterns (NPs) and a method for analysing generated nutritional patterns using F...
M. Sulaiman Khan, Maybin K. Muyeba, Frans Coenen
ERSA
2008
93views Hardware» more  ERSA 2008»
13 years 9 months ago
Multiparadigm Computing for Space-Based Synthetic Aperture Radar
Projected computational requirements for future space missions are outpacing technologies and trends in conventional embedded microprocessors. In order to meet the necessary levels...
Adam Jacobs, Grzegorz Cieslewski, Casey Reardon, A...
HCI
2007
13 years 9 months ago
A Qualitative Oriented Study About IT Procurement Processes: Comparison of 4 European Countries
This study shows that in a qualitative study a small sample size is sufficient to gain interesting results and show differences between the procurement of IT services in different ...
Michael Schiessl, Sabrina Duda
ANCS
2005
ACM
14 years 1 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna