Sciweavers

876 search results - page 44 / 176
» Propagating Class and Method Combination
Sort
View
SIAMNUM
2010
150views more  SIAMNUM 2010»
14 years 4 months ago
Quasi-Optimal Convergence Rate of an Adaptive Discontinuous Galerkin Method
We analyze an adaptive discontinuous finite element method (ADFEM) for symmetric second order linear elliptic operators. The method is formulated on nonconforming meshes made of si...
Andrea Bonito, Ricardo H. Nochetto
DMIN
2006
152views Data Mining» more  DMIN 2006»
14 years 11 months ago
Anomaly Detection Using the Dempster-Shafer Method
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
ICCCN
2007
IEEE
15 years 4 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms tha...
Theodor Richardson, Chin-Tser Huang
SCAM
2005
IEEE
15 years 3 months ago
Object-oriented cohesion as a surrogate of software comprehension: an empirical study
The concept of software cohesion in both the procedural and object-oriented paradigm is well known and documented. What is not so well known or documented is the perception of wha...
Steve Counsell, Stephen Swift, Allan Tucker
MOBICOM
2006
ACM
15 years 3 months ago
On delivery guarantees of face and combined greedy-face routing in ad hoc and sensor networks
It was recently reported that all known face and combined greedy-face routing variants cannot guarantee message delivery in arbitrary undirected planar graphs. The purpose of this...
Hannes Frey, Ivan Stojmenovic