Sciweavers

726 search results - page 36 / 146
» From Anomaly Reports to Cases
Sort
View
CODES
1996
IEEE
15 years 4 months ago
A Multi-Level Transformation Approach to HW/SW Codesign: A Case Study
This reported work applies a transformational synthesis approach to hardware/software codesign. In this approach, the process of algorithm design is coupled early on with hardware...
Tommy King-Yin Cheung, Graham R. Hellestrand, Pras...
ACMDIS
2008
ACM
15 years 1 months ago
Paper interface to electronic medical records: a case of usage-driven technology appropriation
We conducted a 6-month project with a physical therapy clinic, involving equal parts ethnographic fieldwork and rapid prototyping. It differed from most reported user-informed des...
Elin Rønby Pedersen, Greg Wolff
SENSYS
2010
ACM
14 years 9 months ago
A case against routing-integrated time synchronization
To achieve more accurate global time synchronization, this paper argues for decoupling the clock distribution network from the routing tree in a multihop wireless network. We find...
Thomas Schmid, Zainul Charbiwala, Zafeiria Anagnos...
DMSN
2006
ACM
15 years 5 months ago
Intelligent system monitoring on large clusters
Modern data centers have a large number of components that must be monitored, including servers, switches/routers, and environmental control systems. This paper describes InteMon,...
Jimeng Sun, Evan Hoke, John D. Strunk, Gregory R. ...
ICITA
2005
IEEE
15 years 5 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon