Sciweavers

858 search results - page 75 / 172
» One Is Enough!
Sort
View
ICSM
2008
IEEE
14 years 3 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
IROS
2008
IEEE
172views Robotics» more  IROS 2008»
14 years 3 months ago
Hand-eye self-calibration of an ultrasound image-based robotic system
— In recent years, there has been an increasing interest in developing systems that couple a robotic device with an ultrasound imager. Applications range from automatic probe pos...
Marie-Aude Vitrani, Guillaume Morel
ISPASS
2008
IEEE
14 years 3 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
ICC
2007
IEEE
103views Communications» more  ICC 2007»
14 years 3 months ago
A More Realistic Approach to Information-Theoretic Sum Capacity of Reverse Link CDMA Systems in a Single Cell
— In this paper, we discuss the information–theoretic approach to finding the pattern of transmission powers of the stations in a CDMA system which maximizes the aggregate cap...
Arash Abadpour, Attahiru Sule Alfa, Anthony C. K. ...
INFOCOM
2007
IEEE
14 years 3 months ago
Multiple-Choice Random Network for Server Load Balancing
Abstract—In many networking applications such as file sharing, structured peer-to-peer networks are increasingly used in dynamic situations with fluctuating load, which require...
Ye Xia, Alin Dobra, Seung Chul Han