Sciweavers

1855 search results - page 56 / 371
» System Consequence
Sort
View
IEEESCC
2007
IEEE
15 years 6 months ago
Intelligent Document Gateway - A Ser vice System Analysis
In today’s fast paced world, it is necessary to process business documents expediently, accurately, and diligently. In other words, processing has to be fast, errors must be pre...
Vikas Krishna, John Bailey, Ana Lelescu
ACMSE
2005
ACM
15 years 5 months ago
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system
In this paper, we describe recent work in developing a peer-topeer collaborative environment. The study examines various locking mechanisms/policies by adjusting the granularity o...
Jon A. Preston, Sushil K. Prasad
CN
2007
179views more  CN 2007»
14 years 12 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ISOLA
2010
Springer
14 years 9 months ago
Design Choices for High-Confidence Distributed Real-Time Software
Safety-critical distributed real-time systems, such as networked medical devices, must operate according to their specification, because incorrect behaviour can have fatal conseque...
Sebastian Fischmeister, Akramul Azim
ICTAI
2005
IEEE
15 years 5 months ago
Hybrid Learning Neuro-Fuzzy Approach for Complex Modeling Using Asymmetric Fuzzy Sets
A hybrid learning neuro-fuzzy system with asymmetric fuzzy sets (HLNFS-A) is proposed in this paper. The learning methods of random optimization (RO) and least square estimation (...
Chunshien Li, Kuo-Hsiang Cheng, Jiann-Der Lee