Sciweavers

2214 search results - page 151 / 443
» complexity 2004
Sort
View
DATE
2004
IEEE
113views Hardware» more  DATE 2004»
14 years 1 months ago
Dynamic Memory Management Design Methodology for Reduced Memory Footprint in Multimedia and Wireless Network Applications
New portable consumer embedded devices must execute multimedia and wireless network applications that demand extensive memory footprint. Moreover, they must heavily rely on Dynami...
David Atienza, Stylianos Mamagkakis, Francky Catth...
DIMVA
2004
13 years 11 months ago
Alarm Reduction and Correlation in Intrusion Detection Systems
: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliability by redundancy and tolerance are an imperative for such dependable networks. In order...
Tobias Chyssler, Stefan Burschka, Michael Semling,...
PST
2004
13 years 11 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 10 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
CSCW
2004
ACM
13 years 10 months ago
CSCW at play: 'there' as a collaborative virtual environment
Video games are of increasing importance, both as a cultural phenomenon and as an application of collaborative technology. In particular, many recent online games feature persiste...
Barry Brown, Marek Bell