Sciweavers

1544 search results - page 107 / 309
» The Process of Adoption
Sort
View
113
Voted
RTCSA
2000
IEEE
15 years 7 months ago
Effect of scheduling jitter on end-to-end delay in TDMA protocols
In this paper, we address the problem of guaranteeing end-to-end (ETE) delay of packets in a distributed system where the technique of time division multiplex access (TDMA)is adop...
Libin Dong, Rami G. Melhem, Daniel Mossé
AUSAI
2008
Springer
15 years 5 months ago
Clustering with XCS on Complex Structure Dataset
Learning Classifier System (LCS) is an effective tool to solve classification problems. Clustering with XCS (accuracy-based LCS) is a novel approach proposed recently. In this pape...
Liangdong Shi, Yang Gao, Lei Wu, Lin Shang
87
Voted
ACSAC
2004
IEEE
15 years 7 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
179
Voted
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
15 years 5 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
SERP
2004
15 years 4 months ago
Using ZOOM Approach to Support MDD
Model-Driven Development (MDD) represents a positive step toward a general model-based approach to software engineering. The Object Management Group (OMG) offers a conceptual fram...
Xiaoping Jia, Adam Steele, Hongming Liu, Lizhang Q...