Sciweavers

2746 search results - page 153 / 550
» Case Study in Survivable Network System Analysis
Sort
View
CORR
2010
Springer
254views Education» more  CORR 2010»
14 years 8 months ago
Information-Theoretic Analysis of an Energy Harvesting Communication System
—In energy harvesting communication systems, an exogenous recharge process supplies energy for the data transmission and arriving energy can be buffered in a battery before consu...
Omur Ozel, Sennur Ulukus
CCS
2007
ACM
15 years 4 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
CCS
2009
ACM
15 years 4 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
HICSS
1999
IEEE
78views Biometrics» more  HICSS 1999»
15 years 2 months ago
A Structured Transformation Approach for Legacy Information Systems - A Cash Receipts/Reimbursements Example
Legacy information systems are difficult to transform into the new or upgraded information systems. Part of the reason is being the incompatibility and the unscalability between t...
Jia-Lang Seng, Wayne Tsai
81
Voted
VISUALIZATION
2005
IEEE
15 years 3 months ago
Interactive Visual Analysis and Exploration of Injection Systems Simulations
Simulations often generate large amounts of data that require use of SciVis techniques for effective exploration of simulation results. In some cases, like 1D theory of fluid dyn...
Kresimir Matkovic, Mario Jelovic, Josip Juric, Zol...