Sciweavers

858 search results - page 75 / 172
» One Is Enough!
Sort
View
114
Voted
ICSM
2008
IEEE
15 years 10 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
107
Voted
IROS
2008
IEEE
172views Robotics» more  IROS 2008»
15 years 10 months ago
Hand-eye self-calibration of an ultrasound image-based robotic system
— In recent years, there has been an increasing interest in developing systems that couple a robotic device with an ultrasound imager. Applications range from automatic probe pos...
Marie-Aude Vitrani, Guillaume Morel
125
Voted
ISPASS
2008
IEEE
15 years 10 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
140
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 10 months ago
A More Realistic Approach to Information-Theoretic Sum Capacity of Reverse Link CDMA Systems in a Single Cell
— In this paper, we discuss the information–theoretic approach to finding the pattern of transmission powers of the stations in a CDMA system which maximizes the aggregate cap...
Arash Abadpour, Attahiru Sule Alfa, Anthony C. K. ...
123
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Multiple-Choice Random Network for Server Load Balancing
Abstract—In many networking applications such as file sharing, structured peer-to-peer networks are increasingly used in dynamic situations with fluctuating load, which require...
Ye Xia, Alin Dobra, Seung Chul Han