Sciweavers

5234 search results - page 966 / 1047
» Method Components - Rationale Revealed
Sort
View
175
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 10 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JORS
2010
189views more  JORS 2010»
14 years 10 months ago
Monte Carlo scenario generation for retail loan portfolios
Monte Carlo simulation is a common method for studying the volatility of market traded instruments. It is less employed in retail lending, because of the inherent nonlinearities in...
J. L. Breeden, D. Ingram
199
Voted
ICSR
2011
Springer
14 years 6 months ago
Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling
Product Line Architecture (PLA) plays a central role in software product line development. In order to support architecture-level variability modeling, most architecture descriptio...
Jiayi Zhu, Xin Peng, Stan Jarzabek, Zhenchang Xing...
161
Voted

Publication
314views
14 years 11 months ago
On the use of discrete Pascal transform in hiding data in images
The Discrete Pascal Transform (DPT) has been proved remarkably useful for edge detection, filter design, discrete-time signal interpolation and data hiding. In the present work a n...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras
IFM
2007
Springer
129views Formal Methods» more  IFM 2007»
15 years 9 months ago
Slotted-Circus
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Andrew Butterfield, Adnan Sherif, Jim Woodcock