Sciweavers

3708 search results - page 597 / 742
» Programming with C Exceptions
Sort
View
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 10 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
HICSS
2003
IEEE
180views Biometrics» more  HICSS 2003»
15 years 10 months ago
A Case Study of Integrating Knowledge Management into the Supply Chain Management Process
To achieve success at supply chain management (SCM), an organization must possess--and share-knowledge about the different facets of the supply chain. Lack of information sharing ...
Nancy C. Shaw, Mary J. Meixell, Francis D. Tuggle
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
15 years 10 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
IPPS
2003
IEEE
15 years 10 months ago
SPMD Image Processing on Beowulf Clusters: Directives and Libraries
Most image processing algorithms can be parallelized by splitting parallel loops and by using very few communication patterns. Code parallelization using MPI still involves much p...
Paulo F. Oliveira, J. M. Hans du Buf
IRI
2003
IEEE
15 years 10 months ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan