Sciweavers

1424 search results - page 200 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
WSCG
2001
114views more  WSCG 2001»
15 years 2 months ago
Interactive Data Exploration with Customized Glyphs
We present a visualization system allowing non-programmers to visualize, explore, and analyze unknown multivariate data by designing an appropriate glyph representation with minim...
Martin Kraus, Thomas Ertl
CORR
2008
Springer
76views Education» more  CORR 2008»
15 years 1 months ago
Measurement of Large Forces and Deflections in Microstructures
Properties of typical MEMS materials have been widely investigated. Mechanical properties of MEMS structures depend not only on the bulk material properties, but also structural fa...
Kai Axel Hals, Einar Halvorsen, Xuyuan Chen
WSC
1998
15 years 2 months ago
Use of Simulation in Optimization of Maintenance Policies
Selecting an optimum maintenance policy independent of other parameters of the production system does not always yield the overall optimum operating conditions. For instance, high...
Farhad Azadivar, J. Victor Shu
JCP
2007
127views more  JCP 2007»
15 years 1 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
ISSRE
2003
IEEE
15 years 6 months ago
An Empirical Study on Testing and Fault Tolerance for Software Reliability Engineering
Software testing and software fault tolerance are two major techniques for developing reliable software systems, yet limited empirical data are available in the literature to eval...
Michael R. Lyu, Zubin Huang, Sam K. S. Sze, Xia Ca...