Sciweavers

963 search results - page 84 / 193
» Modeling and analysis of real -time systems with mutex compo...
Sort
View
SEKE
2005
Springer
15 years 5 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 4 hour ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
MOBICOM
1995
ACM
15 years 3 months ago
Mobile Wireless Network System Simulation
In this paper, we describe a simulation environment which is used to examine, validate, and predict the performance of mobile wireless network systems. This simulation environment...
Joel Short, Rajive Bagrodia, Leonard Kleinrock
CEC
2005
IEEE
15 years 5 months ago
Two-layered face detection system using evolutionary algorithm
This paper proposes a novel face detection method based on Principal Component Analysis (PCA) and Evolutionary Algorithm (EA). In a view-based approach to face detection, the face ...
Jun-Su Jang, Jong-Hwan Kim
PICS
2001
15 years 1 months ago
Influence of Resolution on Scanner Noise Perceptibility
The perceptibility of scanner noise as a function of resolution is studied using a model for the human visual system and for the scanner noise. The visual system is modeled using ...
Gaurav Sharma, Keith T. Knox