Sciweavers

1664 search results - page 145 / 333
» Making a Case for Multi-Agent Systems
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
WSC
2007
15 years 7 months ago
Measuring manufacturing throughput using takt time analysis and simulation
This paper is motivated by a case study performed at a company that manufactures two main types of customized products. In an effort to significantly increase their throughput cap...
Jun Duanmu, Kevin Taaffe
DSN
2007
IEEE
15 years 11 months ago
Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions
This paper concerns the validity of a widely used method for estimating the architecture-level mean time to failure (MTTF) due to soft errors. The method first calculates the fai...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
CSCW
2006
ACM
15 years 10 months ago
From the war room to the living room: decision support for home-based therapy teams
Teams of therapists often provide targeted interventions for children with developmental disabilities. A common practice in these cases is one-on-one interaction between a therapi...
Julie A. Kientz, Gillian R. Hayes, Gregory D. Abow...
FPL
2005
Springer
131views Hardware» more  FPL 2005»
15 years 10 months ago
An Efficient Approach to Hide the Run-Time Reconfiguration from SW Applications
Dynamically reconfigurable logic is becoming an important design unit in SoC system. A method to make the reconfiguration management transparent to software applications is requir...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi