Sciweavers

882 search results - page 168 / 177
» Improving Visual Impact Analysis
Sort
View
77
Voted
DAC
2008
ACM
14 years 11 months ago
Application mapping for chip multiprocessors
The problem attacked in this paper is one of automatically mapping an application onto a Network-on-Chip (NoC) based chip multiprocessor (CMP) architecture in a locality-aware fas...
Guangyu Chen, Feihui Li, Seung Woo Son, Mahmut T. ...
DAGSTUHL
2007
14 years 11 months ago
Integrated Human Behavior Modeling
In order to prevent emergencies or critical situations where humans are the origin, a timely provision of information thus obtained for the coordinating services and the on-site st...
Michael Berger, Dagmar Beyer, Stephan Prueckner
MODELLIERUNG
2001
14 years 11 months ago
Dependency Charts as a Means to Model Inter-Scenario Dependencies
: Scenarios/use cases have gained wide-spread use over the last couple of years. In software engineering they are mainly used to capture requirements and specify a system. Many sof...
Johannes Ryser, Martin Glinz
CCS
2010
ACM
14 years 9 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
COMCOM
2007
95views more  COMCOM 2007»
14 years 9 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...