Sciweavers

392 search results - page 34 / 79
» Modelling Variation in Quality Attributes
Sort
View
CCS
2004
ACM
15 years 5 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
GRAPHICSINTERFACE
2009
14 years 9 months ago
Rendering lunar eclipses
Johannes Kepler first attributed the visibility of lunar eclipses to refraction in the Earth's atmosphere in his Astronomiae Pars Optica in 1604. We describe a method for ren...
Theodore C. Yapo, Barbara Cutler
TSE
1998
116views more  TSE 1998»
14 years 11 months ago
A Framework-Based Approach to the Development of Network-Aware Applications
— Modern networks provide a QoS (quality of service) model to go beyond best-effort services, but current QoS models are oriented towards low-level network parameters (e.g., band...
Jürg Bolliger, Thomas R. Gross
IEEEAMS
2003
IEEE
15 years 5 months ago
Service Morphing: Integrated System- and Application-Level Service
Service morphing is a set of techniques used to continuously meet an application’s Quality of Service (QoS) needs, in the presence of run-time variations in service locations, p...
Christian Poellabauer, Karsten Schwan, Sandip Agar...
CVPR
2012
IEEE
13 years 2 months ago
Saliency filters: Contrast based filtering for salient region detection
Saliency estimation has become a valuable tool in image processing. Yet, existing approaches exhibit considerable variation in methodology, and it is often difficult to attribute...
Federico Perazzi, Philipp Krähenbühl, Ya...