Sciweavers

1795 search results - page 288 / 359
» Security Models and Information Flow
Sort
View
DDECS
2007
IEEE
105views Hardware» more  DDECS 2007»
14 years 3 months ago
Layout to Logic Defect Analysis for Hierarchical Test Generation
- As shown by previous studies, shorts between the interconnect wires should be considered as the predominant cause of failures in CMOS circuits. Fault models and tools for targeti...
Maksim Jenihhin, Jaan Raik, Raimund Ubar, Witold A...
CIA
2007
Springer
14 years 3 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
14 years 1 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
APN
2004
Springer
14 years 22 days ago
Web Supported Enactment of Petri-Net Based Workflows with XRL/Flower
This paper describes concepts and features of a Web-based system called XRL/flower for carrying out Petri-net based workflows described with XRL (eXchangeable Routing Language). XR...
Alexander Norta
LCPC
2000
Springer
14 years 17 days ago
SmartApps: An Application Centric Approach to High Performance Computing
State-of-the-art run-time systems are a poor match to diverse, dynamic distributed applications because they are designed to provide support to a wide variety of applications, with...
Lawrence Rauchwerger, Nancy M. Amato, Josep Torrel...