Sciweavers

22114 search results - page 172 / 4423
» Use of Models and Modelling Techniques for Service Developme...
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
DAC
2002
ACM
14 years 9 months ago
A universal technique for fast and flexible instruction-set architecture simulation
In the last decade, instruction-set simulators have become an essential development tool for the design of new programmable architectures. Consequently, the simulator performance ...
Achim Nohl, Gunnar Braun, Oliver Schliebusch, Rain...
ISCC
2003
IEEE
153views Communications» more  ISCC 2003»
14 years 1 months ago
A Human-based Technique for Measuring Video Data Similarity
The increasing use of multimedia streams nowadays necessitates the development of efficient and effective methodologies for manipulating databases storing them. Moreover, content-...
Waleed E. Farag, Hussein M. Abdel-Wahab
PERCOM
2010
ACM
13 years 6 months ago
Towards ontology-driven development of applications for smart environments
—In the environments where heterogeneous devices need to share information, utilize services of each other, and participate as components in various smart applications, it is com...
Artem Katasonov, Marko Palviainen
ISCC
1999
IEEE
121views Communications» more  ISCC 1999»
14 years 15 days ago
Customer Service Management: Towards a Management Information Base for an IP Connectivity Service
Customer Service Management (CSM) offers a management interface between customer and service provider, which enables customers to individually monitor and control their subscribed...
Michael Langer, Stefan Loidl, Michael Nerb