Sciweavers

858 search results - page 75 / 172
» One Is Enough!
Sort
View
ICSM
2008
IEEE
15 years 7 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
78
Voted
IROS
2008
IEEE
172views Robotics» more  IROS 2008»
15 years 7 months ago
Hand-eye self-calibration of an ultrasound image-based robotic system
— In recent years, there has been an increasing interest in developing systems that couple a robotic device with an ultrasound imager. Applications range from automatic probe pos...
Marie-Aude Vitrani, Guillaume Morel
97
Voted
ISPASS
2008
IEEE
15 years 7 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
109
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 7 months ago
A More Realistic Approach to Information-Theoretic Sum Capacity of Reverse Link CDMA Systems in a Single Cell
— In this paper, we discuss the information–theoretic approach to finding the pattern of transmission powers of the stations in a CDMA system which maximizes the aggregate cap...
Arash Abadpour, Attahiru Sule Alfa, Anthony C. K. ...
94
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Multiple-Choice Random Network for Server Load Balancing
Abstract—In many networking applications such as file sharing, structured peer-to-peer networks are increasingly used in dynamic situations with fluctuating load, which require...
Ye Xia, Alin Dobra, Seung Chul Han