Sciweavers

341 search results - page 57 / 69
» A Security Engineering Process based on Patterns
Sort
View
106
Voted
EUROSYS
2007
ACM
15 years 8 months ago
Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors
The major chip manufacturers have all introduced chip multiprocessing (CMP) and simultaneous multithreading (SMT) technology into their processing units. As a result, even low-end...
David K. Tam, Reza Azimi, Michael Stumm
116
Voted
PAMI
2012
13 years 2 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
ISF
2010
164views more  ISF 2010»
14 years 9 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
77
Voted
ADBIS
2005
Springer
138views Database» more  ADBIS 2005»
15 years 5 months ago
Software Quality and Life Cycles
Abstract. Quality of software has growing role of the modern software engineering work. Typical current trends in the development process are the dominating role of quality systems...
Hannu Jaakkola, Bernhard Thalheim
CORR
2008
Springer
128views Education» more  CORR 2008»
14 years 11 months ago
Electricity Demand and Energy Consumption Management System
This project describes the electricity demand and energy consumption management system and its application to Southern Peru smelter. It is composted of an hourly demand-forecastin...
Juan Ojeda Sarmiento