Sciweavers

3410 search results - page 427 / 682
» Measuring Model Transformation in Model Driven Development
Sort
View
CCS
2003
ACM
15 years 10 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
HICSS
2009
IEEE
165views Biometrics» more  HICSS 2009»
15 years 11 months ago
Studying Knowledge Management System Success in System Administration
Significant temporal and monetary costs are associated with the development and implementation of a knowledge management system (KMS). To justify this investment, it is important ...
Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sa...
SPAA
1990
ACM
15 years 8 months ago
Analysis of Multithreaded Architectures for Parallel Computing
Multithreading has been proposed as an architectural strategy for tolerating latency in multiprocessors and, through limited empirical studies, shown to offer promise. This paper ...
Rafael H. Saavedra-Barrera, David E. Culler, Thors...
DEBS
2007
ACM
15 years 8 months ago
On adding replies to publish-subscribe
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Gianpaolo Cugola, Matteo Migliavacca, Alessandro M...
ICPR
2010
IEEE
15 years 8 months ago
Vehicle Recognition As Changes in Satellite Imagery
Over the last several years, a new probabilistic representation for 3-d volumetric modeling has been developed. The main purpose of the model is to detect deviations from the norm...
Ozge Can Ozcanli, Joseph Mundy