Sciweavers

2435 search results - page 390 / 487
» System Exploration of SystemC Designs
Sort
View
107
Voted
COMPSAC
2000
IEEE
15 years 8 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
15 years 8 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
IDA
1999
Springer
15 years 8 months ago
Knowledge-Based Visualization to Support Spatial Data Mining
Data mining methods are designed for revealing significant relationships and regularities in data collections. Regarding spatially referenced data, analysis by means of data minin...
Gennady L. Andrienko, Natalia V. Andrienko
WETICE
1998
IEEE
15 years 8 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
AGENTS
1997
Springer
15 years 8 months ago
An Adaptive Web Page Recommendation Service
An adaptive recommendation service seeks to adapt to its users, providing increasingly personalized recommendations over time. In this paper we introduce the \Fab" adaptive W...
Marko Balabanovic