Sciweavers

218 search results - page 19 / 44
» Risk Assessment in Complex Interacting Infrastructure System...
Sort
View
ICDE
2008
IEEE
119views Database» more  ICDE 2008»
14 years 9 months ago
Toward Simulation-Based Optimization in Data Stream Management Systems
Abstract-- Our demonstration introduces a novel system architecture which massively facilitates optimization in data stream management systems (DSMS). The basic idea is to decouple...
Bernhard Seeger, Christoph Heinz, Jürgen Kr&a...
WOA
2001
13 years 9 months ago
Enlightened Agents in TuCSoN
Abstract--In the network-centric computing era, applications often involve sets of autonomous, unpredictable, and possibly mobile entities interacting within open, dynamic, and pos...
Alessandro Ricci, Andrea Omicini, Enrico Denti
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
14 years 16 days ago
Task-Structure Analysis: A Modularized Approach for Modeling Knowledge Intensive Processes
Modular design methodologies, which decompose large and complex systems into components that are relatively easy to develop and maintain, have been widely adopted in the software ...
Roman M. Wong, Siddhartha Bhattacharyya
IAW
2003
IEEE
14 years 27 days ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
EUROMICRO
2007
IEEE
14 years 1 months ago
Scope Management of Non-Functional Requirements
Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a cons...
Mohamad Kassab, Maya Daneva, Olga Ormandjieva