Sciweavers

1007 search results - page 121 / 202
» An Empirical Study of the Coolstreaming System
Sort
View
ISNN
2005
Springer
15 years 7 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
ACMDIS
2004
ACM
15 years 7 months ago
Communication functions and the adaptation of design representations in interdisciplinary teams
Design representations in user-centered design serve intentions for directing design process and communication functions for enlisting interdisciplinary participation. To disentan...
David G. Hendry
SC
2004
ACM
15 years 7 months ago
Improving Throughput for Grid Applications with Network Logistics
This work describes a technique for improving network performance in Grid environments that we refer to as “logistics.” We demonstrate that by using storage and cooperative fo...
D. Martin Swany
ATAL
2004
Springer
15 years 7 months ago
Trust-Based Mechanism Design
We define trust-based mechanism design as an augmentation of traditional mechanism design in which agents take into account the degree of trust that they have in their counterpar...
Rajdeep K. Dash, Sarvapali D. Ramchurn, Nicholas R...
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
15 years 7 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...