Sciweavers

822 search results - page 128 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
ISESE
2002
IEEE
14 years 1 months ago
The Appropriateness of Gutman's Means-End Chain Model in Software Evaluation
The primary objective of this paper was to examine the extent to which Gutman’s Means-End Chain Model can be used to describe the influences given to the choice of characteristi...
Bernard Wong
3DGIS
2006
Springer
14 years 2 months ago
3D Navigation for 3D-GIS - Initial Requirements
The needs for three-dimensional (3D) visualization and navigation within 3D-GIS environment are growing and expanding rapidly in a variety of fields. In a steady shift from tradit...
Ivin Amri Musliman, Alias Abdul-Rahman, Volker Coo...
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
SIGMETRICS
2002
ACM
104views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Improving cluster availability using workstation validation
We demonstrate a framework for improving the availability of cluster based Internet services. Our approach models Internet services as a collection of interconnected components, e...
Taliver Heath, Richard P. Martin, Thu D. Nguyen
RTAS
2007
IEEE
14 years 2 months ago
Stochastic Metrics for Debugging the Timing Behaviour of Real-Time Systems
Stochastic analysis techniques for real-time systems model the execution time of tasks as random variables. These techniques constitute a very powerful tool to study the behaviour...
Joaquín Entrialgo, Javier García, Jo...