Sciweavers

479 search results - page 64 / 96
» Scaling Product Ownership
Sort
View
SECURWARE
2007
IEEE
15 years 6 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
ESWS
2007
Springer
15 years 6 months ago
Developing Ontologies for Collaborative Engineering in Mechatronics
Abstract. Creating a coherent set of ontologies to support a collaborative design process amongst different firms which develop mechatronic products is a challenge due to the seman...
Violeta Damjanovic, Wernher Behrendt, Manuela Pl&o...
GPCE
2007
Springer
15 years 6 months ago
A type-centric framework for specifying heterogeneous, large-scale, component-oriented, architectures
Maintaining integrity, consistency, and enforcing conformance in architectures of large-scale systems requires specification and enforcement of many different forms of structural...
Georg Jung, John Hatcliff
SCALESPACE
2007
Springer
15 years 6 months ago
Linear Image Reconstruction by Sobolev Norms on the Bounded Domain
The reconstruction problem is usually formulated as a variational problem in which one searches for that image that minimizes a so called prior (image model) while insisting on cer...
Bart Janssen, Remco Duits, Bart M. ter Haar Romeny
CCGRID
2006
IEEE
15 years 5 months ago
Exploit Failure Prediction for Adaptive Fault-Tolerance in Cluster Computing
As the scale of cluster computing grows, it is becoming hard for long-running applications to complete without facing failures on large-scale clusters. To address this issue, chec...
Yawei Li, Zhiling Lan