Sciweavers

1544 search results - page 107 / 309
» The Process of Adoption
Sort
View
RTCSA
2000
IEEE
14 years 2 months ago
Effect of scheduling jitter on end-to-end delay in TDMA protocols
In this paper, we address the problem of guaranteeing end-to-end (ETE) delay of packets in a distributed system where the technique of time division multiplex access (TDMA)is adop...
Libin Dong, Rami G. Melhem, Daniel Mossé
AUSAI
2008
Springer
14 years 3 days ago
Clustering with XCS on Complex Structure Dataset
Learning Classifier System (LCS) is an effective tool to solve classification problems. Clustering with XCS (accuracy-based LCS) is a novel approach proposed recently. In this pape...
Liangdong Shi, Yang Gao, Lei Wu, Lin Shang
ACSAC
2004
IEEE
14 years 1 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 12 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
SERP
2004
13 years 11 months ago
Using ZOOM Approach to Support MDD
Model-Driven Development (MDD) represents a positive step toward a general model-based approach to software engineering. The Object Management Group (OMG) offers a conceptual fram...
Xiaoping Jia, Adam Steele, Hongming Liu, Lizhang Q...