Sciweavers

1486 search results - page 188 / 298
» Firewall Rules Analysis
Sort
View
143
Voted
FDL
2006
IEEE
15 years 10 months ago
Formalizing TLM with Communicating State Machines
Transaction Level Models are widely being used as high-level reference models during embedded systems development. High simulation speed and great modeling flexibility are the ma...
Bernhard Niemann, Christian Haubelt
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 10 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer
ICDM
2006
IEEE
132views Data Mining» more  ICDM 2006»
15 years 10 months ago
Mining for Tree-Query Associations in a Graph
New applications of data mining, such as in biology, bioinformatics, or sociology, are faced with large datasets structured as graphs. We present an efficient algorithm for minin...
Eveline Hoekx, Jan Van den Bussche
IJCNN
2006
IEEE
15 years 10 months ago
A Columnar Competitive Model with Simulated Annealing for Solving Combinatorial Optimization Problems
— One of the major drawbacks of the Hopfield network is that when it is applied to certain polytopes of combinatorial problems, such as the traveling salesman problem (TSP), the...
Eu Jin Teoh, Huajin Tang, Kay Chen Tan
IROS
2006
IEEE
123views Robotics» more  IROS 2006»
15 years 10 months ago
Robot Navigation based on the Mapping of Coarse Qualitative Route Descriptions to Route Graphs
— This paper describes the use of natural language route descriptions in the mobile robot navigation domain. Guided by corpus analysis and earlier work on coarse qualitative rout...
Christian Mandel, Udo Frese, Thomas Röfer