Sciweavers

2337 search results - page 413 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Efficient error estimating coding: feasibility and applications
Motivated by recent emerging systems that can leverage partially correct packets in wireless networks, this paper investigates the novel concept of error estimating codes (EEC). W...
Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu
RE
2006
Springer
13 years 7 months ago
The Detection and Classification of Non-Functional Requirements with Application to Early Aspects
This paper introduces an information retrieval based approach for automating the detection and classification of non-functional requirements (NFRs). Early detection of NFRs is use...
Jane Cleland-Huang, Raffaella Settimi, Xuchang Zou...
IEEEIA
2009
13 years 5 months ago
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning a...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...
GI
1998
Springer
13 years 12 months ago
Self-Organizing Data Mining
"KnowledgeMiner" was designed to support the knowledge extraction process on a highly automated level. Implemented are 3 different GMDH-type self-organizing modeling algo...
Frank Lemke, Johann-Adolf Müller
WWW
2004
ACM
14 years 8 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl