Sciweavers

154 search results - page 24 / 31
» A Structured System Methodology for FPGA Based System-on-A-C...
Sort
View
CORR
2008
Springer
145views Education» more  CORR 2008»
14 years 9 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
WISE
2002
Springer
15 years 2 months ago
UTML: Unified Transaction Modeling Language
Web transactions may be complex, composed of several sub-transactions accessing different resources including legacy systems. They may also have complex semantics. To deal with co...
Nektarios Gioldasis, Stavros Christodoulakis
INFOCOM
2007
IEEE
15 years 3 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
IMCSIT
2010
14 years 7 months ago
German subordinate clause word order in dialogue-based CALL.
We present a dialogue system for exercising the German subordinate clause word order. The pedagogical methodology we adopt is based on focused tasks: the targeted linguistic struct...
Magdalena Wolska, Sabrina Wilske
75
Voted
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 4 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...