Sciweavers

1592 search results - page 271 / 319
» Software Process - Standards, Assessments and Improvement
Sort
View
IEEEIAS
2009
IEEE
15 years 6 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ESAW
2009
Springer
15 years 5 months ago
Engineering Agent Organisations in a Business Environment
Abstract. Motivated by demands from the commercial world for software systems that can assist in the reorganisation of processes for the purpose of reducing business complexity, we...
Dimitris Traskas, Julian A. Padget
DATE
2008
IEEE
156views Hardware» more  DATE 2008»
15 years 5 months ago
Transparent Reconfigurable Acceleration for Heterogeneous Embedded Applications
Embedded systems are becoming increasingly complex. Besides the additional processing capabilities, they are characterized by high diversity of computational models coexisting in ...
Antonio Carlos Schneider Beck, Mateus B. Rutzig, G...
ICIP
2008
IEEE
15 years 5 months ago
Adaptive block-based approach to image stabilization
The objective of image stabilization is to prevent image blurring caused by the relative motion between the camera and the scene during the image integration time. In this paper w...
Marius Tico
COMSWARE
2007
IEEE
15 years 5 months ago
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...