Sciweavers

3104 search results - page 123 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
121
Voted
INFSOF
2007
83views more  INFSOF 2007»
15 years 3 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
139
Voted
ICMCS
2005
IEEE
145views Multimedia» more  ICMCS 2005»
15 years 9 months ago
From Physiological Signals to Emotions: Implementing and Comparing Selected Methods for Feature Extraction and Classification
Little attention has been paid so far to physiological signals for emotion recognition compared to audio-visual emotion channels, such as facial expressions or speech. In this pap...
Johannes Wagner, Jonghwa Kim, Elisabeth Andr&eacut...
141
Voted
QEST
2009
IEEE
15 years 10 months ago
Mean-Field Analysis for the Evaluation of Gossip Protocols
—Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial...
Rena Bakhshi, Lucia Cloth, Wan Fokkink, Boudewijn ...
129
Voted
ANSS
2003
IEEE
15 years 9 months ago
Optimization of Cell Spaces Simulation for the Modeling of Fire Spreading
This paper presents a simulation performance improvement of the application of the Multicomponent Discrete Time System Specification (MultiDTSS) formalism to a fire spread. Multic...
Alexandre Muzy, Eric Innocenti, Jean Franço...
ICDE
2006
IEEE
118views Database» more  ICDE 2006»
15 years 9 months ago
Evaluation of Placement and Access Asignment for Replicated Object Striping
The number of stored objects that should be targets of high throughput retrieval, such as multimedia stream objects, is increasing recently. To implement a high throughput storage...
Makoto Kataigi, Dai Kobayashi, Tomohiro Yoshihara,...