Sciweavers

2336 search results - page 49 / 468
» A Proposed Methodology for Web Development
Sort
View
IWIA
2003
IEEE
15 years 3 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
IPPS
1998
IEEE
15 years 2 months ago
A Mapping Methodology for Designing Software Task Pipelines for Embedded Signal Processing
Abstract. In this paper, we present a methodology for mapping an Embedded Signal Processing ESP application onto HPC platforms such that the throughput performance is maximized. Pr...
Myungho Lee, Wenheng Liu, Viktor K. Prasanna
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
14 years 11 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
STEP
2003
IEEE
15 years 3 months ago
Empirical Methodologies in Software Engineering
The collection and use of evidence in Software Engineering practice and research are essential elements in the development of the discipline. This paper discusses the need for evi...
Ray Dawson, Phil Bones, Briony J. Oates, Pearl Bre...
CSREASAM
2006
15 years 1 days ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...