Sciweavers

4902 search results - page 234 / 981
» Multi-agent Systems Methodology
Sort
View
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 12 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
ISSS
2002
IEEE
124views Hardware» more  ISSS 2002»
15 years 10 months ago
A New Performance Evaluation Approach for System Level Design Space Exploration
Application specific systems have potential for customization of design with a view to achieve a better costperformance-power trade-off. Such customization requires extensive de...
M. Balakrishnan, Anshul Kumar, C. P. Joshi
INFOCOM
2006
IEEE
15 years 11 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
153
Voted
FDG
2009
ACM
15 years 12 months ago
Evaluation of intelligent camera control systems based on cognitive models of comprehension
We propose a novel evaluation methodology for intelligent camera control systems based on established techniques of measuring story comprehension from cognitive psychology. The pr...
Arnav Jhala, R. Michael Young
ISAS
2004
Springer
15 years 10 months ago
A Modular Approach for Model-Based Dependability Evaluation of a Class of Systems
Analytical and simulative modeling for dependability and performance evaluation has been proven to be a useful and versatile approach in all the phases of the system life cycle. I...
Stefano Porcarelli, Felicita Di Giandomenico, Paol...