Sciweavers

134 search results - page 25 / 27
» Getting complete rulebase from recorded data
Sort
View
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
15 years 4 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
GROUP
2009
ACM
15 years 4 months ago
Information handover in time-critical work
Information transfer under time pressure and stress often leads to information loss. This paper studies the characteristics and problems of information handover from the emergency...
Aleksandra Sarcevic, Randall S. Burd
IJDE
2006
95views more  IJDE 2006»
14 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
OIR
2011
401views Neural Networks» more  OIR 2011»
14 years 21 days ago
Using Online Collaborative Tools for Groups to Co-Construct Knowledge
(limit 250 words) Purpose This paper reports and describes the use of MediaWiki and Google Docs at undergraduate level as online collaboration tools for co-constructing knowledge i...
Sam Kai Wah Chu, David M. Kennedy
METRICS
2005
IEEE
15 years 3 months ago
Validation of New Theses on Off-the-Shelf Component Based Development
Using OTS (Off-The-Shelf) components in software development has become increasingly popular in the IT industry. OTS components can be either COTS (Commercial-Off-The-Shelf), or O...
Jingyue Li, Reidar Conradi, Odd Petter N. Slyngsta...