Sciweavers

2748 search results - page 369 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
ATAL
2008
Springer
15 years 6 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
MODELS
2010
Springer
15 years 2 months ago
Inferring Meta-models for Runtime System Data from the Clients of Management APIs
Abstract. A new trend in runtime system monitoring is to utilize MOFbased techniques in analyzing the runtime system data. Approaches and tools have been proposed to automatically ...
Hui Song, Gang Huang, Yingfei Xiong, Franck Chauve...
INFOCOM
2011
IEEE
14 years 8 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...

Publication
336views
15 years 9 months ago
A Discriminative approach for Wavelet Shrinkage Denoising
This paper suggests a discriminative approach for wavelet denoising where a set of mapping functions (MF) are applied to the transform coefficients in an attempt to produce a noi...
Yacov Hel-Or and Doron Shaked
RE
2008
Springer
15 years 3 months ago
Rule-Based Maintenance of Post-Requirements Traceability Relations
An accurate set of traceability relations between software development artifacts is desirable to support evolutionary development. However, even where an initial set of traceabili...
Patrick Mäder, Orlena Gotel, Ilka Philippow