Sciweavers

5446 search results - page 989 / 1090
» Software Architecture - Introduction
Sort
View
136
Voted
VIROLOGY
2010
162views more  VIROLOGY 2010»
15 years 1 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
IAT
2010
IEEE
15 years 1 months ago
Agent Technologies for Space Applications: The DAFA Experience
-- The Distributed Agents For Autonomy (DAFA) study has been performed for ESA/ESTEC by SciSys UK Ltd, VEGA, and Politecnico di Milano in 2008-2009. The aim of DAFA study has been ...
Francesco Amigoni, Andrea Brambilla, Michèl...
158
Voted
KSEM
2010
Springer
15 years 1 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
QEST
2010
IEEE
15 years 1 months ago
On the Theory of Stochastic Processors
Traditional architecture design approaches hide hardware uncertainties from the software stack through overdesign, which is often expensive in terms of power consumption. The recen...
Parasara Sridhar Duggirala, Sayan Mitra, Rakesh Ku...
139
Voted
REALWSN
2010
15 years 1 months ago
Location Based Wireless Sensor Services in Life Science Automation
Over the last years Wireless Sensor Networks (WSN) have been becoming increasingly applicable for real world scenarios and now production ready solutions are available. In the same...
Benjamin Wagner, Philipp Gorski, Frank Golatowski,...