Sciweavers

1037 search results - page 134 / 208
» Architecture Knowledge Management: Challenges, Approaches, a...
Sort
View
CN
1999
115views more  CN 1999»
14 years 9 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
DISCEX
2003
IEEE
15 years 3 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
15 years 10 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
CONTEXT
2007
Springer
15 years 4 months ago
Adaptive and Context-aware Scenarios for Technology Enhanced Learning System based on a Didactical Theory and a Hierarchical Tas
Among the main issues of future technology-enhanced learning systems, we can mention the following ones: the ability to reuse learning resources (learning objects, tools and servic...
Jean-Louis Tetchueng, Serge Garlatti, Sylvain Laub...
DAC
2007
ACM
15 years 10 months ago
Progressive Decomposition: A Heuristic to Structure Arithmetic Circuits
Despite the impressive progress of logic synthesis in the past decade, finding the best architecture for a given circuit still remains an open problem and largely unsolved. In mos...
Ajay K. Verma, Philip Brisk, Paolo Ienne